Analysis
-
max time kernel
67s -
max time network
131s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-11-2020 17:39
Static task
static1
Behavioral task
behavioral1
Sample
17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe
Resource
win10v20201028
General
-
Target
17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe
-
Size
598KB
-
MD5
9100bc30a19d9d5ae2249d3fd804d086
-
SHA1
c5be3f0e73738dbeb9663fb178b2c5b8a03dff5b
-
SHA256
17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43
-
SHA512
c89e2104101d16f12596da8d0f0d43418bd6283d01a255b8278f00aeafdfc6eea653761b999ec024ad77a9e2968d5b1c41f0b3c857b49bc9179f961c6568604d
Malware Config
Signatures
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4232 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 3232 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 3196 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 3104 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 576 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 836 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 1128 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 1336 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 1580 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 1916 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 2296 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 2580 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 2980 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe 3084 4752 WerFault.exe 17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe -
Suspicious behavior: EnumeratesProcesses 213 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3196 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 3104 WerFault.exe 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 4232 WerFault.exe Token: SeBackupPrivilege 4232 WerFault.exe Token: SeDebugPrivilege 4232 WerFault.exe Token: SeDebugPrivilege 3232 WerFault.exe Token: SeDebugPrivilege 3196 WerFault.exe Token: SeDebugPrivilege 3104 WerFault.exe Token: SeDebugPrivilege 576 WerFault.exe Token: SeDebugPrivilege 836 WerFault.exe Token: SeDebugPrivilege 1128 WerFault.exe Token: SeDebugPrivilege 1336 WerFault.exe Token: SeDebugPrivilege 1580 WerFault.exe Token: SeDebugPrivilege 1916 WerFault.exe Token: SeDebugPrivilege 2296 WerFault.exe Token: SeDebugPrivilege 2580 WerFault.exe Token: SeDebugPrivilege 2980 WerFault.exe Token: SeDebugPrivilege 3084 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe"C:\Users\Admin\AppData\Local\Temp\17cd806ef5f500c8fdd0a2f18cbff5ec713f5701d3c713d02409f2d0f2207a43.exe"1⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 8162⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 9322⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 10762⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 10522⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 10882⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 10842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 12082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 14162⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 16202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 13802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 13802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 16802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 17202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 13922⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3084
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/576-18-0x00000000042D0000-0x00000000042D1000-memory.dmpFilesize
4KB
-
memory/576-21-0x0000000004900000-0x0000000004901000-memory.dmpFilesize
4KB
-
memory/836-25-0x0000000004B10000-0x0000000004B11000-memory.dmpFilesize
4KB
-
memory/836-22-0x00000000044E0000-0x00000000044E1000-memory.dmpFilesize
4KB
-
memory/1128-29-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/1128-26-0x0000000004960000-0x0000000004961000-memory.dmpFilesize
4KB
-
memory/1336-33-0x00000000056F0000-0x00000000056F1000-memory.dmpFilesize
4KB
-
memory/1336-30-0x0000000004E40000-0x0000000004E41000-memory.dmpFilesize
4KB
-
memory/1580-37-0x0000000005840000-0x0000000005841000-memory.dmpFilesize
4KB
-
memory/1580-34-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/1916-38-0x0000000004420000-0x0000000004421000-memory.dmpFilesize
4KB
-
memory/1916-43-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/2296-44-0x00000000044E0000-0x00000000044E1000-memory.dmpFilesize
4KB
-
memory/2296-47-0x0000000004C10000-0x0000000004C11000-memory.dmpFilesize
4KB
-
memory/2580-51-0x00000000048F0000-0x00000000048F1000-memory.dmpFilesize
4KB
-
memory/2580-54-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/2980-58-0x0000000005320000-0x0000000005321000-memory.dmpFilesize
4KB
-
memory/2980-55-0x0000000004AF0000-0x0000000004AF1000-memory.dmpFilesize
4KB
-
memory/3084-59-0x00000000042D0000-0x00000000042D1000-memory.dmpFilesize
4KB
-
memory/3084-62-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/3104-17-0x00000000054A0000-0x00000000054A1000-memory.dmpFilesize
4KB
-
memory/3104-14-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/3196-10-0x00000000046D0000-0x00000000046D1000-memory.dmpFilesize
4KB
-
memory/3196-13-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/3232-6-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/3232-9-0x00000000055D0000-0x00000000055D1000-memory.dmpFilesize
4KB
-
memory/4232-2-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/4232-3-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/4232-5-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/4752-0-0x0000000000E84000-0x0000000000E85000-memory.dmpFilesize
4KB
-
memory/4752-1-0x0000000002BE0000-0x0000000002BE1000-memory.dmpFilesize
4KB