Analysis
-
max time kernel
123s -
max time network
120s -
platform
windows10_x64 -
resource
win10 -
submitted
16/07/2020, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
DHL-AWB.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DHL-AWB.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
DHL-AWB.exe
-
Size
569KB
-
MD5
fa9482cfddfea01ef410ea3cf64f108b
-
SHA1
243d8e4ac47601f0399f37cb7859d0900d587798
-
SHA256
a221aea48e4c8450ffde297704231b8023ee99a1e98892c3958dc3072bb33f16
-
SHA512
0b90c10070e9e6a662f9ab5d4a55bb225814eb542ff4538398dd3147da842b5f00660c7a88cd02444c8fa46477894732422ca44fa9a251b8f216c91c5b8e716c
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3456 3828 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3456 WerFault.exe Token: SeBackupPrivilege 3456 WerFault.exe Token: SeDebugPrivilege 3456 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL-AWB.exe"C:\Users\Admin\AppData\Local\Temp\DHL-AWB.exe"1⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 9082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456
-