Analysis
-
max time kernel
129s -
max time network
102s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13-07-2020 04:06
Static task
static1
Behavioral task
behavioral1
Sample
Candidate_list.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Candidate_list.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Candidate_list.exe
-
Size
331KB
-
MD5
db1cba646f5432bc3e528e9d67f9fc01
-
SHA1
0f5d941c986623b79484fdde2ce0d8f278163956
-
SHA256
75ce329091d54aa2fcf6cd6f58704493e0f4ac878279c49db239140051341931
-
SHA512
9a51cb0c4e1d9803cbc38f816d44a3ddb8d0f74a7d84a27465f94242e1a2cf926abd8b7a8048e9ced176c0a855a770daee6d89c128e88d49626413b866c6ee90
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2748 1500 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2748 WerFault.exe Token: SeBackupPrivilege 2748 WerFault.exe Token: SeDebugPrivilege 2748 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Candidate_list.exe"C:\Users\Admin\AppData\Local\Temp\Candidate_list.exe"1⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 11402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-