Analysis
-
max time kernel
15s -
max time network
111s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
04/10/2020, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
msdtc.bin.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
msdtc.bin.exe
Resource
win10v200722
0 signatures
0 seconds
General
-
Target
msdtc.bin.exe
-
Size
5.2MB
-
MD5
ba186e8a8abcbf0ed4fbb5fac6ba5821
-
SHA1
2ebac954c1941cecefa078ca2fb50f1b9281a3bd
-
SHA256
46da8d04de493e9858caa01cfadcd8e740be109e379985880fa05f23040f8d68
-
SHA512
54a14900b16226d4b95148508a54cd3decaadb593c2467e8c41e32ea1a167dd25e7b8dc5ec3021bd07a3d3f11265b9b54ce301d73ffe5e0a2ea328113b5ab158
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3864 2080 WerFault.exe 65 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3864 WerFault.exe Token: SeBackupPrivilege 3864 WerFault.exe Token: SeDebugPrivilege 3864 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\msdtc.bin.exe"C:\Users\Admin\AppData\Local\Temp\msdtc.bin.exe"1⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 5042⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-