Analysis
-
max time kernel
139s -
max time network
107s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
17/07/2020, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
544755300977.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
544755300977.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
544755300977.exe
-
Size
890KB
-
MD5
43a4ff5752ddee3df016f2eb38ed8874
-
SHA1
1d12ed5721f87d69c0f6f3e102d59b48605e8a7c
-
SHA256
53aea080cd433c61d90184c531d36de3d0f82649579997dce665f8f3f80039dc
-
SHA512
05f410f08d049ad24a7165074d6fc9aa0d479ad2d5e04cda6569d761f21ae81ef30ca24b2eb4aca9afeb1ed76fabafc6c464103c5587102c58c53fc5e87e3962
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2620 3656 WerFault.exe 65 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2620 WerFault.exe Token: SeBackupPrivilege 2620 WerFault.exe Token: SeDebugPrivilege 2620 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\544755300977.exe"C:\Users\Admin\AppData\Local\Temp\544755300977.exe"1⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 11722⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-