Analysis
-
max time kernel
126s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
16-07-2020 10:09
Static task
static1
Behavioral task
behavioral1
Sample
DST261234.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DST261234.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
DST261234.exe
-
Size
572KB
-
MD5
a5375147434baba2a3eb32606e9931b5
-
SHA1
aa1ef84f0918adb4682452221772eb6a61c3618b
-
SHA256
24a00145d774f6aac5b11be0188c88f4b9485e626f464e94bb355db0e2ad0f93
-
SHA512
a6f72a783c18f97e3fdaaef23b9634c8b15bf46d8b393cb87490d55de8fbb535724e04904881a98038cca1108c5ccf8b6d1fff32e345e502d9941c29910732c2
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3684 1612 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe 3684 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3684 WerFault.exe Token: SeBackupPrivilege 3684 WerFault.exe Token: SeDebugPrivilege 3684 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DST261234.exe"C:\Users\Admin\AppData\Local\Temp\DST261234.exe"1⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 9122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-