Analysis
-
max time kernel
116s -
max time network
118s -
platform
windows10_x64 -
resource
win10 -
submitted
14-07-2020 13:41
Static task
static1
Behavioral task
behavioral1
Sample
uksWKvZWmEjyfQm.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
uksWKvZWmEjyfQm.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
uksWKvZWmEjyfQm.exe
-
Size
973KB
-
MD5
0ba295c9b19580265e061e5febedf9f9
-
SHA1
15cef08eb4c1004611f795dcae47ac0db268a6a6
-
SHA256
abb96fbc3e4b80337204e33d19134498c7eca75ba47390fe4df7939383515e6d
-
SHA512
4b5ba0019752cec28d48bf8bfcee6199dc0d10519e1433f465c4f9f87ab7bd9ceb7c478b12758200d10cf0ca068dd3718c73706150c4e2faebb2c3c926a66711
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3792 3588 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3792 WerFault.exe Token: SeBackupPrivilege 3792 WerFault.exe Token: SeDebugPrivilege 3792 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uksWKvZWmEjyfQm.exe"C:\Users\Admin\AppData\Local\Temp\uksWKvZWmEjyfQm.exe"1⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 9042⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3792
-