Analysis
-
max time kernel
130s -
max time network
123s -
platform
windows10_x64 -
resource
win10 -
submitted
16-07-2020 12:10
Static task
static1
Behavioral task
behavioral1
Sample
2f4a4a094459562728e72ac1d23ce38e6ae71d72da6eecf63b825c0e0dad08ec.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2f4a4a094459562728e72ac1d23ce38e6ae71d72da6eecf63b825c0e0dad08ec.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
2f4a4a094459562728e72ac1d23ce38e6ae71d72da6eecf63b825c0e0dad08ec.exe
-
Size
384KB
-
MD5
93e2811522740e51b6bf599820907055
-
SHA1
496ee8a2bba2d0cb47c926f165119331c84427ed
-
SHA256
2f4a4a094459562728e72ac1d23ce38e6ae71d72da6eecf63b825c0e0dad08ec
-
SHA512
79ed7055453ccd6d3575c182950114a65d20643fe2ee85562476f17a514eccdd3f6a19054d2e788d965c2e8c9118f8a4730a3887556bc2c559eeec15454451a0
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1940 384 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1940 WerFault.exe Token: SeBackupPrivilege 1940 WerFault.exe Token: SeDebugPrivilege 1940 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f4a4a094459562728e72ac1d23ce38e6ae71d72da6eecf63b825c0e0dad08ec.exe"C:\Users\Admin\AppData\Local\Temp\2f4a4a094459562728e72ac1d23ce38e6ae71d72da6eecf63b825c0e0dad08ec.exe"1⤵PID:384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 9082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1940
-