Analysis
-
max time kernel
123s -
max time network
125s -
platform
windows10_x64 -
resource
win10 -
submitted
15-07-2020 18:23
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order-7-15-2020.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Purchase Order-7-15-2020.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Purchase Order-7-15-2020.exe
-
Size
952KB
-
MD5
c6b0da8a4b100bee3958498acdbcf97d
-
SHA1
1bb228742a3a201edafbfbaa12f796f3a460a1c0
-
SHA256
e745073f173f603b6200a9fc9e6975ee72a9c3395c1868471056e651ae1470e5
-
SHA512
da382870c1eecabe4c6abc1ea4374cea481f9bd511cd6ac4cd4d77b5a71f8cdb0eef4fab488cfdf0bcca5a707e8ae2aa83f5540748bdc0b832c9426abb4f6207
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3924 720 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3924 WerFault.exe Token: SeBackupPrivilege 3924 WerFault.exe Token: SeDebugPrivilege 3924 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order-7-15-2020.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order-7-15-2020.exe"1⤵PID:720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 9082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3924
-