Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 11:58
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
file.exe
-
Size
765KB
-
MD5
2254eea10e2cb5e29c09bf28170c2e69
-
SHA1
566257811fb1b9b99304933b10b49c74e7038bbf
-
SHA256
de083ffcc44c047fbf9a4938aca158f47045b9ee3ce98ce7b24202422fca3396
-
SHA512
136237a1f634f32bde0048ef5be59b88a3f356b7ede4493f03e0a67ba1324e9e9223a02fec52695e7db8cfe5e02211d87d8bf0550a51d1b1837b2bba67f39562
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3940 3304 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3940 WerFault.exe Token: SeBackupPrivilege 3940 WerFault.exe Token: SeDebugPrivilege 3940 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 11362⤵
- Suspicious behavior: EnumeratesProcesses
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3940
-