Analysis
-
max time kernel
114s -
max time network
137s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
16-07-2020 07:16
Static task
static1
Behavioral task
behavioral1
Sample
Specifications Tender Drawings and Technical Data.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Specifications Tender Drawings and Technical Data.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Specifications Tender Drawings and Technical Data.exe
-
Size
562KB
-
MD5
a0ec117d9f39578098d4cc1ec074b363
-
SHA1
62149898908373e9796d7267a9ebe36e17cf9bd0
-
SHA256
ac096eae22a7f902793da67988ec4d86794135ce3375665343349f6b60755d88
-
SHA512
e19b084d9d5ee1c7793f1f73531b84ab4b5381de34ba7080177e4207d44b555362644d9b00017ca200e7b1fa33bbf00494ab706f174105344b5e58956eb72bc4
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3752 2536 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe 3752 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3752 WerFault.exe Token: SeBackupPrivilege 3752 WerFault.exe Token: SeDebugPrivilege 3752 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Specifications Tender Drawings and Technical Data.exe"C:\Users\Admin\AppData\Local\Temp\Specifications Tender Drawings and Technical Data.exe"1⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 9122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752
-