Analysis
-
max time kernel
123s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
16-07-2020 19:04
Static task
static1
Behavioral task
behavioral1
Sample
Payment remittance.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Payment remittance.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Payment remittance.exe
-
Size
560KB
-
MD5
dbccda8fd671e5b565502b49233730bc
-
SHA1
17b26090bc5af5bfa52b97e98f20899fd6272988
-
SHA256
bd39e2be08156a6453d018515f1ad7e493991114cdf0d7dafcadfd7ca4540507
-
SHA512
0f008d8dc08e5a6a53d54dde9b92451cb375147ba95d2bc93f8d6da24dff9c3d19f459dbc216c80e865eff02c8b7249bdd31ca6fb0bdd1d9c455184c45e3d6d4
Score
3/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2540 WerFault.exe Token: SeBackupPrivilege 2540 WerFault.exe Token: SeDebugPrivilege 2540 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2540 972 WerFault.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment remittance.exe"C:\Users\Admin\AppData\Local\Temp\Payment remittance.exe"1⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 9122⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Program crash
PID:2540
-