Analysis
-
max time kernel
123s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
17/07/2020, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
uhsBKFwa7Uzvntn.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
uhsBKFwa7Uzvntn.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
uhsBKFwa7Uzvntn.exe
-
Size
1.6MB
-
MD5
0892d8ff956c6ffddc0634cdb8c513f2
-
SHA1
9fa325cca370fbd86baaf5b0b3a6cbf2d3032f8a
-
SHA256
1146e4d995c67932f70852ddd73410efbf0ecfbe227fa9834ec7dfea12cb6097
-
SHA512
be353d188fe1f07229f46418bb76c82085ba23ed749a3dc66ea10bc46a64d756d4c21c37394f1c02609ed01efecf606dc23327d3b872e4faf17f579bb1bf165b
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2604 2536 WerFault.exe 67 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2604 WerFault.exe Token: SeBackupPrivilege 2604 WerFault.exe Token: SeDebugPrivilege 2604 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uhsBKFwa7Uzvntn.exe"C:\Users\Admin\AppData\Local\Temp\uhsBKFwa7Uzvntn.exe"1⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 9162⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:2604
-