Analysis
-
max time kernel
65s -
max time network
106s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
15-07-2020 12:40
Static task
static1
Behavioral task
behavioral1
Sample
new.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
new.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
new.exe
-
Size
851KB
-
MD5
6da3f250c69c7540fc0b665bf26d9bb5
-
SHA1
5da0a0dee94cd2f49bba7d14402acb59d1650cd3
-
SHA256
af14ffe4c3aa39dd8b219ca3cf1757492183c5ac069b507a1d36bb4430057582
-
SHA512
1a09baf36739734d613bc537145e2de1b865790c99e0ec51525bc14931a1777be63163f527780d4579d9b59dc447102649b9797f10533753cff596ee6e0da56c
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2168 2564 WerFault.exe 65 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe 2168 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2168 WerFault.exe Token: SeBackupPrivilege 2168 WerFault.exe Token: SeDebugPrivilege 2168 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\new.exe"C:\Users\Admin\AppData\Local\Temp\new.exe"1⤵PID:2564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 9402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-