Analysis
-
max time kernel
66s -
max time network
110s -
platform
windows10_x64 -
resource
win10 -
submitted
17-07-2020 13:27
Static task
static1
Behavioral task
behavioral1
Sample
DOC.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DOC.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
DOC.exe
-
Size
708KB
-
MD5
6b8091a3446c4794afe76977c38e91fa
-
SHA1
ee78f43f53f4b4dc63e8a1ae246a2bfe91b19e98
-
SHA256
b676494a4538d77ebd0d61fac6e6b2609201f46c9c63fd817990b48b8031bb71
-
SHA512
4e076e7b79660bc80275b7613494afe340aee1189a2d65f6c5c9eade902f89d820823a6c60a352ee3dbf4a9bac00c52c40894ab9e17dbb974d5388d0a027d2af
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3492 2984 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe 3492 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3492 WerFault.exe Token: SeBackupPrivilege 3492 WerFault.exe Token: SeDebugPrivilege 3492 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOC.exe"C:\Users\Admin\AppData\Local\Temp\DOC.exe"1⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 9082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-