Analysis
-
max time kernel
114s -
max time network
135s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
15-07-2020 05:25
Static task
static1
Behavioral task
behavioral1
Sample
316152a4a6c3601cb08de2fd678f0104757c5141ffccc14d3481c5f0d7d0761d.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
316152a4a6c3601cb08de2fd678f0104757c5141ffccc14d3481c5f0d7d0761d.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
316152a4a6c3601cb08de2fd678f0104757c5141ffccc14d3481c5f0d7d0761d.exe
-
Size
1.1MB
-
MD5
36f734ad1864e227d2eb094735f9da2e
-
SHA1
be3473f3115dd2eeb956ba0c536a5217cd9abc83
-
SHA256
316152a4a6c3601cb08de2fd678f0104757c5141ffccc14d3481c5f0d7d0761d
-
SHA512
ebf9c717909a6d8217a8da92745c86312c9c2230b03e125e4e57ecab20b371e924b732b2e837cab441bdd06956f969c0fef0b6820c9bdf97a8ff2d8a864d8438
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3696 2536 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe 3696 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3696 WerFault.exe Token: SeBackupPrivilege 3696 WerFault.exe Token: SeDebugPrivilege 3696 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\316152a4a6c3601cb08de2fd678f0104757c5141ffccc14d3481c5f0d7d0761d.exe"C:\Users\Admin\AppData\Local\Temp\316152a4a6c3601cb08de2fd678f0104757c5141ffccc14d3481c5f0d7d0761d.exe"1⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 9362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-