Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows10_x64 -
resource
win10 -
submitted
13/07/2020, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
products inquiry.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
products inquiry.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
products inquiry.exe
-
Size
229KB
-
MD5
a53604e429dd528d745800b1b533a85e
-
SHA1
778ef3670b3a55dbdefaf4f5f756aa1964feb330
-
SHA256
63c1ce2aef3529012b5e2d4453754583f41b5aa0f1f8e12e8e08a8a8abc9470e
-
SHA512
5f56e7aaf702ed1db467cbb8fa0ec72af89cc4cb8cbff5bb96dbd41b71004d463685efb123093c95b03a00a2f7c12ff2657a3e1e87cec2ec6520856b0efc283a
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3924 720 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3924 WerFault.exe Token: SeBackupPrivilege 3924 WerFault.exe Token: SeDebugPrivilege 3924 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\products inquiry.exe"C:\Users\Admin\AppData\Local\Temp\products inquiry.exe"1⤵PID:720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 11402⤵
- Suspicious behavior: EnumeratesProcesses
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3924
-