Analysis
-
max time kernel
66s -
max time network
131s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-11-2020 17:50
Static task
static1
Behavioral task
behavioral1
Sample
b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe
Resource
win10v20201028
General
-
Target
b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe
-
Size
708KB
-
MD5
dca059c7fea13d73c9f090faad08f0ce
-
SHA1
ca1649e5adf3370ac20eaeb6ab5b84a8fd52bc4d
-
SHA256
b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf
-
SHA512
6d66a2d92f45ffb666ae7853df99d703449d4cf384b361789114b38b9f718ff08e46fe7df34e1619b2aa5b5f2ea5ed7102e679876a9ced15f278566b6943cb92
Malware Config
Signatures
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3580 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 508 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 2676 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 3992 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 3548 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 2264 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 3980 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 3840 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 492 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 3596 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 496 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 200 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe 3304 652 WerFault.exe b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe -
Suspicious behavior: EnumeratesProcesses 189 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 3580 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 508 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3992 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 3580 WerFault.exe Token: SeBackupPrivilege 3580 WerFault.exe Token: SeDebugPrivilege 3580 WerFault.exe Token: SeDebugPrivilege 508 WerFault.exe Token: SeDebugPrivilege 2676 WerFault.exe Token: SeDebugPrivilege 3992 WerFault.exe Token: SeDebugPrivilege 3548 WerFault.exe Token: SeDebugPrivilege 2264 WerFault.exe Token: SeDebugPrivilege 3980 WerFault.exe Token: SeDebugPrivilege 3840 WerFault.exe Token: SeDebugPrivilege 492 WerFault.exe Token: SeDebugPrivilege 3596 WerFault.exe Token: SeDebugPrivilege 496 WerFault.exe Token: SeDebugPrivilege 200 WerFault.exe Token: SeDebugPrivilege 3304 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe"C:\Users\Admin\AppData\Local\Temp\b23e0fa0852d359938e58bf1a2a62e636df526b2a95418cbf65d9351045f89cf.exe"1⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 7962⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 9322⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 10762⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 10482⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 10962⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 10402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 12082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 14162⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 13402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 14482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 14362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 16202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 12402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3304
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/200-59-0x0000000004DB0000-0x0000000004DB1000-memory.dmpFilesize
4KB
-
memory/200-56-0x0000000004580000-0x0000000004581000-memory.dmpFilesize
4KB
-
memory/492-45-0x0000000005720000-0x0000000005721000-memory.dmpFilesize
4KB
-
memory/492-42-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/496-55-0x0000000004A70000-0x0000000004A71000-memory.dmpFilesize
4KB
-
memory/496-50-0x0000000004580000-0x0000000004581000-memory.dmpFilesize
4KB
-
memory/508-6-0x0000000004A80000-0x0000000004A81000-memory.dmpFilesize
4KB
-
memory/508-9-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/652-0-0x00000000024D6000-0x00000000024D7000-memory.dmpFilesize
4KB
-
memory/652-1-0x0000000004240000-0x0000000004241000-memory.dmpFilesize
4KB
-
memory/652-30-0x0000000004340000-0x0000000004341000-memory.dmpFilesize
4KB
-
memory/2264-29-0x0000000004870000-0x0000000004871000-memory.dmpFilesize
4KB
-
memory/2264-24-0x0000000004580000-0x0000000004581000-memory.dmpFilesize
4KB
-
memory/2676-13-0x0000000005390000-0x0000000005391000-memory.dmpFilesize
4KB
-
memory/2676-10-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB
-
memory/3304-65-0x0000000004A70000-0x0000000004A71000-memory.dmpFilesize
4KB
-
memory/3548-21-0x0000000005230000-0x0000000005231000-memory.dmpFilesize
4KB
-
memory/3548-18-0x0000000004C00000-0x0000000004C01000-memory.dmpFilesize
4KB
-
memory/3580-2-0x0000000004AE0000-0x0000000004AE1000-memory.dmpFilesize
4KB
-
memory/3580-3-0x0000000004AE0000-0x0000000004AE1000-memory.dmpFilesize
4KB
-
memory/3580-5-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/3596-46-0x0000000004580000-0x0000000004581000-memory.dmpFilesize
4KB
-
memory/3596-49-0x0000000004CB0000-0x0000000004CB1000-memory.dmpFilesize
4KB
-
memory/3840-38-0x0000000004710000-0x0000000004711000-memory.dmpFilesize
4KB
-
memory/3840-41-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/3980-34-0x0000000004C10000-0x0000000004C11000-memory.dmpFilesize
4KB
-
memory/3980-37-0x0000000005240000-0x0000000005241000-memory.dmpFilesize
4KB
-
memory/3992-14-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/3992-17-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB