Analysis
-
max time kernel
138s -
max time network
96s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13/07/2020, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.CAP_HookExKeylogger.27527.31730.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.CAP_HookExKeylogger.27527.31730.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.CAP_HookExKeylogger.27527.31730.exe
-
Size
743KB
-
MD5
f015a07129c6eddf53e821a879199743
-
SHA1
62e7e285b340a4dfde6803a18978cd532bf25603
-
SHA256
3a55c81d07416737a006fa2158d5a3398b862c8bcc80d6ff96bd1acf07bfed87
-
SHA512
f673df0d6294727e51953ed710808ed78de5c8640c064cf671b74d871bf688a9f84f7a78f0d6ea3dc95b1e0926fac630c0676ef9f351714f73fe294f61157629
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2512 3656 WerFault.exe 65 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2512 WerFault.exe Token: SeBackupPrivilege 2512 WerFault.exe Token: SeDebugPrivilege 2512 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.CAP_HookExKeylogger.27527.31730.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.CAP_HookExKeylogger.27527.31730.exe"1⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 9082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512
-