Analysis
-
max time kernel
52s -
max time network
32s -
platform
windows7_x64 -
resource
win7 -
submitted
13/07/2020, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
2.exe
-
Size
63KB
-
MD5
807e68132cc9f6def300da6cd8c6417c
-
SHA1
da00155621e459ecbb2b7cebe8ca4e2137b4ee76
-
SHA256
0b5b880307bbb0233d7acf9685b9ef0d596657c4a52b6096f998689d743ec168
-
SHA512
5c782232964e68ec00e89c8f6bfc17c9d57d7978a4fb7c6b36d878a61c48aaf8ee01c2ffb80857bb2866a387e9ee840fddb88f034dbda29a81240d2906146fcd
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1228 1100 WerFault.exe 23 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1228 1100 2.exe 24 PID 1100 wrote to memory of 1228 1100 2.exe 24 PID 1100 wrote to memory of 1228 1100 2.exe 24 PID 1100 wrote to memory of 1228 1100 2.exe 24 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1228 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1228 WerFault.exe 1228 WerFault.exe 1228 WerFault.exe 1228 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 2002⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1228
-