Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10_x64 -
resource
win10 -
submitted
17/07/2020, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
Request Quotation.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Request Quotation.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
Request Quotation.exe
-
Size
759KB
-
MD5
9fb2846dca4accdd1c4fcaf212e1c6f6
-
SHA1
b49cfbe4a19d7ab3ee7d1a33425ccc822bba3d2e
-
SHA256
d0b71fdf377abca1c191fedeab8311dac158632edb66f3b894166686d61bfad6
-
SHA512
9ae52ef0f49c06e650c2ede614b6ff5f3a2b6de5cc18b892c5cf72bd583a4919f160ad4c30cac8a126fdaf1e3066a7a674e471138dc70213268f597227e81616
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3872 4092 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe 3872 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3872 WerFault.exe Token: SeBackupPrivilege 3872 WerFault.exe Token: SeDebugPrivilege 3872 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request Quotation.exe"1⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 9242⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3872
-