Analysis

  • max time kernel
    129s
  • max time network
    98s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    14/07/2020, 13:25

General

  • Target

    Invoice copy.pdf.exe

  • Size

    699KB

  • MD5

    87de5db071f313cc111754e5853ddb2d

  • SHA1

    6f4db55d134f2d08b719b14a3d9a3c328c1ae405

  • SHA256

    21327be564dca2dd0136871d257a99b68daf3a09af75a0fb947f65708f1df2b0

  • SHA512

    0e0c91a9222d229f6c0fd4c26931cb645bfd80da3e8acdc2997bbda94dda4ab8521e50d780f552ab0d4e0ea0e2ab0c54736c4e26214e0b30864b0aa7de3affd8

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Invoice copy.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Invoice copy.pdf.exe"
    1⤵
      PID:1616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 912
        2⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2980

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2980-0-0x0000000004C60000-0x0000000004C61000-memory.dmp

            Filesize

            4KB

          • memory/2980-1-0x00000000050A0000-0x00000000050A1000-memory.dmp

            Filesize

            4KB