Analysis
-
max time kernel
71s -
max time network
132s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 21:56
Static task
static1
Behavioral task
behavioral1
Sample
26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe
Resource
win10v20201028
General
-
Target
26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe
-
Size
598KB
-
MD5
cb0a06a7bf5a2017f1a58fcd576d117d
-
SHA1
c30ad86b1196cd4307f3b3cfa4b638d236a03b02
-
SHA256
26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28
-
SHA512
3132cfe92836d5eb77f005e04939acf83626f28a3f2cce4835c2c7093cc7c970aa91f686e8e650dcec704f8bc55cd5309a03d4032ce443e246773b61ba77130f
Malware Config
Signatures
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1012 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 3588 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 2252 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 3656 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 3384 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 3320 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 2040 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 2720 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 3380 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 3836 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 2052 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 3868 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe 1276 1044 WerFault.exe 26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe -
Suspicious behavior: EnumeratesProcesses 189 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3656 WerFault.exe 3384 WerFault.exe 3384 WerFault.exe 3384 WerFault.exe 3384 WerFault.exe 3384 WerFault.exe 3384 WerFault.exe 3384 WerFault.exe 3384 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 1012 WerFault.exe Token: SeBackupPrivilege 1012 WerFault.exe Token: SeDebugPrivilege 1012 WerFault.exe Token: SeDebugPrivilege 3588 WerFault.exe Token: SeDebugPrivilege 2252 WerFault.exe Token: SeDebugPrivilege 3656 WerFault.exe Token: SeDebugPrivilege 3384 WerFault.exe Token: SeDebugPrivilege 3320 WerFault.exe Token: SeDebugPrivilege 2040 WerFault.exe Token: SeDebugPrivilege 2720 WerFault.exe Token: SeDebugPrivilege 3380 WerFault.exe Token: SeDebugPrivilege 3836 WerFault.exe Token: SeDebugPrivilege 2052 WerFault.exe Token: SeDebugPrivilege 3868 WerFault.exe Token: SeDebugPrivilege 1276 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe"C:\Users\Admin\AppData\Local\Temp\26eb49d7b6c68105af777f6a4681b6a9be1e5673467e4b77848f391bdb681d28.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 7962⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 9682⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 10122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 10802⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 10922⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 11162⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 12122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 14282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 16282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 16802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 13762⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 16042⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 16122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1012-2-0x0000000004F10000-0x0000000004F11000-memory.dmpFilesize
4KB
-
memory/1012-3-0x0000000004F10000-0x0000000004F11000-memory.dmpFilesize
4KB
-
memory/1012-5-0x0000000005540000-0x0000000005541000-memory.dmpFilesize
4KB
-
memory/1044-0-0x0000000000F34000-0x0000000000F35000-memory.dmpFilesize
4KB
-
memory/1044-1-0x0000000002A10000-0x0000000002A11000-memory.dmpFilesize
4KB
-
memory/1276-103-0x0000000004460000-0x0000000004461000-memory.dmpFilesize
4KB
-
memory/1276-106-0x0000000004C90000-0x0000000004C91000-memory.dmpFilesize
4KB
-
memory/2040-79-0x00000000045C0000-0x00000000045C1000-memory.dmpFilesize
4KB
-
memory/2040-82-0x00000000049F0000-0x00000000049F1000-memory.dmpFilesize
4KB
-
memory/2052-98-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/2052-95-0x00000000048B0000-0x00000000048B1000-memory.dmpFilesize
4KB
-
memory/2252-10-0x00000000048E0000-0x00000000048E1000-memory.dmpFilesize
4KB
-
memory/2252-13-0x0000000004F10000-0x0000000004F11000-memory.dmpFilesize
4KB
-
memory/2720-86-0x0000000004990000-0x0000000004991000-memory.dmpFilesize
4KB
-
memory/2720-83-0x0000000004450000-0x0000000004451000-memory.dmpFilesize
4KB
-
memory/3320-26-0x0000000005500000-0x0000000005501000-memory.dmpFilesize
4KB
-
memory/3320-22-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/3380-87-0x00000000048E0000-0x00000000048E1000-memory.dmpFilesize
4KB
-
memory/3380-90-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/3384-21-0x0000000005510000-0x0000000005511000-memory.dmpFilesize
4KB
-
memory/3384-18-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/3588-9-0x0000000005450000-0x0000000005451000-memory.dmpFilesize
4KB
-
memory/3588-6-0x0000000004E20000-0x0000000004E21000-memory.dmpFilesize
4KB
-
memory/3656-17-0x0000000005430000-0x0000000005431000-memory.dmpFilesize
4KB
-
memory/3656-14-0x0000000004F00000-0x0000000004F01000-memory.dmpFilesize
4KB
-
memory/3836-94-0x0000000005670000-0x0000000005671000-memory.dmpFilesize
4KB
-
memory/3836-91-0x0000000004E40000-0x0000000004E41000-memory.dmpFilesize
4KB
-
memory/3868-102-0x0000000004E20000-0x0000000004E21000-memory.dmpFilesize
4KB
-
memory/3868-99-0x00000000045F0000-0x00000000045F1000-memory.dmpFilesize
4KB