Analysis
-
max time kernel
116s -
max time network
118s -
platform
windows10_x64 -
resource
win10 -
submitted
31-07-2020 08:29
Static task
static1
Behavioral task
behavioral1
Sample
tgwqjo.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
tgwqjo.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
tgwqjo.exe
-
Size
831KB
-
MD5
c9bdb2a0214fd34e21c9671da4bbbca4
-
SHA1
bd33a69c8926f4fd9747e9db063fcbae1e964bd5
-
SHA256
d96ee923cda8458627c393925aebc1f908ab6a40ebe8c9ea0f049e3edf27bce2
-
SHA512
5dd32f148634462317316e6ddcfdbe92d59a730dbd1949b68304bf2810d1a2075c273aaf29c7f6b2552273f03326274d56989d02c2e42f899ee5f79b702d4413
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1960 3848 WerFault.exe tgwqjo.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
tgwqjo.exeWerFault.exepid process 3848 tgwqjo.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe 1960 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
tgwqjo.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3848 tgwqjo.exe Token: SeRestorePrivilege 1960 WerFault.exe Token: SeBackupPrivilege 1960 WerFault.exe Token: SeDebugPrivilege 1960 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tgwqjo.exe"C:\Users\Admin\AppData\Local\Temp\tgwqjo.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 13162⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken