Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 11:18
Static task
static1
Behavioral task
behavioral1
Sample
DHL-#AWB130501923096.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DHL-#AWB130501923096.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
DHL-#AWB130501923096.exe
-
Size
353KB
-
MD5
91c50c43932cbbf106bb36bc614d053c
-
SHA1
24e75ba96eaa2a54b1bb55e29ce7ea990e7c7131
-
SHA256
66e0e592828da25235eccd1a7fdb3138f6acb5ee9d89bb483d8a384ef264a394
-
SHA512
291e33bc0a4a4e35b834650d129435b8c021f7b1eeda91d45b70764f2a7a12853c632f9f70a0b9780fd2ef4e6c40e2ece42524ef5575f6c3111e1b9eab5ad563
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3844 3044 WerFault.exe DHL-#AWB130501923096.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe 3844 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3844 WerFault.exe Token: SeBackupPrivilege 3844 WerFault.exe Token: SeDebugPrivilege 3844 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL-#AWB130501923096.exe"C:\Users\Admin\AppData\Local\Temp\DHL-#AWB130501923096.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 11402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken