Analysis
-
max time kernel
3s -
max time network
8s -
platform
windows7_x64 -
resource
win7 -
submitted
04-10-2020 14:34
Static task
static1
Behavioral task
behavioral1
Sample
b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exe
-
Size
191KB
-
MD5
77b0bb6da287fce8e8e0f7a6cecf19e1
-
SHA1
979007ae0a74b0d1191ccf035e3ef4c861dded55
-
SHA256
b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6
-
SHA512
73f36543994ef369754d290622997270c619d699b420c660744d68f84518ee5dd6c094496e7c0cf11f6cff111e763cbfd827f1fbfe4ccc1273317992f60467a5
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 108 1032 WerFault.exe b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 108 WerFault.exe 108 WerFault.exe 108 WerFault.exe 108 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 108 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exedescription pid process target process PID 1032 wrote to memory of 108 1032 b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exe WerFault.exe PID 1032 wrote to memory of 108 1032 b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exe WerFault.exe PID 1032 wrote to memory of 108 1032 b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exe WerFault.exe PID 1032 wrote to memory of 108 1032 b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exe"C:\Users\Admin\AppData\Local\Temp\b2097005e9acb8c20765cd74080713d30175b8a859a1db51b56f3fe4f38fc5c6.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 1282⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken