Analysis
-
max time kernel
117s -
max time network
137s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
16-07-2020 06:39
Static task
static1
Behavioral task
behavioral1
Sample
Pictures.jpg.scr
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Pictures.jpg.scr
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Pictures.jpg.scr
-
Size
710KB
-
MD5
281198c4b0cf5277fb57896af997ada3
-
SHA1
3066e53d111ee159ece9ecd4edc977a1a38decc5
-
SHA256
6e9b80abff99f9ce1d477c30f23c7ab327c1d5fef3edda5f68497aacd35ae03b
-
SHA512
334e2cc90289c1a79fdbbd115397a1a6f888aa370f9059ef3783fe984f6e844cac1615a41932c458a2cab24e39d7a0cb81cd5cb8465e9c18056b879095f118b8
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3800 2060 WerFault.exe 67 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3800 WerFault.exe Token: SeBackupPrivilege 3800 WerFault.exe Token: SeDebugPrivilege 3800 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pictures.jpg.scr"C:\Users\Admin\AppData\Local\Temp\Pictures.jpg.scr" /S1⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 9362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3800
-