Analysis
-
max time kernel
131s -
max time network
126s -
platform
windows10_x64 -
resource
win10 -
submitted
16-07-2020 18:33
Static task
static1
Behavioral task
behavioral1
Sample
payment Slip.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
payment Slip.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
payment Slip.exe
-
Size
824KB
-
MD5
f2dc2472943a80a1adb493cefc36235a
-
SHA1
0288a2c724051d6f42784b84dbb5cae170144358
-
SHA256
6d64f2c47bc182a160e02ceebb8e194dd627fb83d762f9d1609d4f1d7cf3ff89
-
SHA512
9ed2ee019ad571e2fe601bb78d5a4f6228734c551db00dafe2eb6752fdf20970b24306a2b60579c2bb4e63b519a4893d1ea4500bb93e42789eda045e067e02a4
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1940 384 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1940 WerFault.exe Token: SeBackupPrivilege 1940 WerFault.exe Token: SeDebugPrivilege 1940 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\payment Slip.exe"1⤵PID:384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 9082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1940
-