Analysis
-
max time kernel
139s -
max time network
105s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
16/07/2020, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
OUTSTANDING PAYMENTS.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
OUTSTANDING PAYMENTS.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
OUTSTANDING PAYMENTS.exe
-
Size
701KB
-
MD5
545352c3b443c8d949fb9bf068be1aef
-
SHA1
0d7569043e0a6566a9680f77b82ffa32f322865f
-
SHA256
895caf8a32b031db037f0b3be265ebc5a909b4f1f1880a252795458a87bf1214
-
SHA512
b1a9c2e7649b927281d18ddf97313f0a08080dfadd5fe04d57379972ded48f6fbd0f319fbbcad712e1c13b301c87a1948ca225f37909d27f7d6a929a29009d50
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2252 3724 WerFault.exe 65 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2252 WerFault.exe Token: SeBackupPrivilege 2252 WerFault.exe Token: SeDebugPrivilege 2252 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OUTSTANDING PAYMENTS.exe"C:\Users\Admin\AppData\Local\Temp\OUTSTANDING PAYMENTS.exe"1⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 9082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-