Analysis
-
max time kernel
15s -
max time network
111s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
19-09-2020 17:37
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BACKDOOR.Trojan.15105.16769.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BACKDOOR.Trojan.15105.16769.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.BACKDOOR.Trojan.15105.16769.exe
-
Size
7.1MB
-
MD5
373c797b11aea9e1d79057983c9e02b0
-
SHA1
9b2a3c7653dbd59c0998e8894e3a71370637625f
-
SHA256
1a6c3a98bd90f34eca1efa419a9c43a4ecde44c8ec818757b5a2d15e08658133
-
SHA512
e23529b47d1b9c073e0f53418f5b8451ecb03c82f9e60d0ffb9e6581d5a6f4c20c8639d79437fd488806421f23c76cfe0343ebc14f4eaa7fcefd4f6290235d64
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2288 3712 WerFault.exe SecuriteInfo.com.BACKDOOR.Trojan.15105.16769.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2288 WerFault.exe Token: SeBackupPrivilege 2288 WerFault.exe Token: SeDebugPrivilege 2288 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BACKDOOR.Trojan.15105.16769.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BACKDOOR.Trojan.15105.16769.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 2362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken