Analysis
-
max time kernel
132s -
max time network
138s -
platform
windows7_x64 -
resource
win7 -
submitted
04-10-2020 10:25
Static task
static1
Behavioral task
behavioral1
Sample
msdtc.bin.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
msdtc.bin.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
msdtc.bin.exe
-
Size
5.2MB
-
MD5
ba186e8a8abcbf0ed4fbb5fac6ba5821
-
SHA1
2ebac954c1941cecefa078ca2fb50f1b9281a3bd
-
SHA256
46da8d04de493e9858caa01cfadcd8e740be109e379985880fa05f23040f8d68
-
SHA512
54a14900b16226d4b95148508a54cd3decaadb593c2467e8c41e32ea1a167dd25e7b8dc5ec3021bd07a3d3f11265b9b54ce301d73ffe5e0a2ea328113b5ab158
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 796 1044 WerFault.exe msdtc.bin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 796 WerFault.exe 796 WerFault.exe 796 WerFault.exe 796 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 796 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 796 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
msdtc.bin.exedescription pid process target process PID 1044 wrote to memory of 796 1044 msdtc.bin.exe WerFault.exe PID 1044 wrote to memory of 796 1044 msdtc.bin.exe WerFault.exe PID 1044 wrote to memory of 796 1044 msdtc.bin.exe WerFault.exe PID 1044 wrote to memory of 796 1044 msdtc.bin.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\msdtc.bin.exe"C:\Users\Admin\AppData\Local\Temp\msdtc.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/796-0-0x0000000000000000-mapping.dmp
-
memory/796-1-0x0000000002120000-0x0000000002131000-memory.dmpFilesize
68KB
-
memory/796-2-0x0000000002120000-0x0000000002131000-memory.dmpFilesize
68KB
-
memory/796-6-0x0000000002560000-0x0000000002571000-memory.dmpFilesize
68KB