Analysis
-
max time kernel
73s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-11-2020 11:38
Static task
static1
Behavioral task
behavioral1
Sample
6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe
Resource
win10v20201028
General
-
Target
6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe
-
Size
690KB
-
MD5
b1e507edf98c04f408530c8cfb13cf60
-
SHA1
7c10e36093f9e129e26f88447fa9979c2b738127
-
SHA256
6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82
-
SHA512
497009f7f18c42bf1a9f53dd9a1ec335e949086e48c8d27d546825857a48029df242b59679fce4369de0bf0e643d52e7883053435b805c83d67faadf1eea40b8
Malware Config
Signatures
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3680 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 3692 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 3380 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 212 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 1320 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 2252 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 1352 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 2872 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 576 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 952 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 3864 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 4092 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe 3940 508 WerFault.exe 6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe -
Suspicious behavior: EnumeratesProcesses 188 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3692 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 212 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 3680 WerFault.exe Token: SeBackupPrivilege 3680 WerFault.exe Token: SeDebugPrivilege 3680 WerFault.exe Token: SeDebugPrivilege 3692 WerFault.exe Token: SeDebugPrivilege 3380 WerFault.exe Token: SeDebugPrivilege 212 WerFault.exe Token: SeDebugPrivilege 1320 WerFault.exe Token: SeDebugPrivilege 2252 WerFault.exe Token: SeDebugPrivilege 1352 WerFault.exe Token: SeDebugPrivilege 2872 WerFault.exe Token: SeDebugPrivilege 576 WerFault.exe Token: SeDebugPrivilege 952 WerFault.exe Token: SeDebugPrivilege 3864 WerFault.exe Token: SeDebugPrivilege 4092 WerFault.exe Token: SeDebugPrivilege 3940 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe"C:\Users\Admin\AppData\Local\Temp\6f90980da759e38d2f6a5963b808f2e18b3f1619dd8a5f072f94c8f8f1646d82.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 8082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 9402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 10762⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 10602⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 10722⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 10882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 12082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 14162⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13642⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 14282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13322⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13922⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 14402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/212-17-0x0000000004A30000-0x0000000004A31000-memory.dmpFilesize
4KB
-
memory/212-20-0x0000000005160000-0x0000000005161000-memory.dmpFilesize
4KB
-
memory/508-1-0x0000000002A70000-0x0000000002A71000-memory.dmpFilesize
4KB
-
memory/508-0-0x0000000000FF6000-0x0000000000FF7000-memory.dmpFilesize
4KB
-
memory/576-40-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB
-
memory/576-37-0x0000000004370000-0x0000000004371000-memory.dmpFilesize
4KB
-
memory/952-44-0x0000000004F20000-0x0000000004F21000-memory.dmpFilesize
4KB
-
memory/952-41-0x00000000046F0000-0x00000000046F1000-memory.dmpFilesize
4KB
-
memory/1320-24-0x00000000049A0000-0x00000000049A1000-memory.dmpFilesize
4KB
-
memory/1320-21-0x0000000004370000-0x0000000004371000-memory.dmpFilesize
4KB
-
memory/1352-32-0x0000000004D40000-0x0000000004D41000-memory.dmpFilesize
4KB
-
memory/1352-29-0x0000000004710000-0x0000000004711000-memory.dmpFilesize
4KB
-
memory/2252-28-0x0000000005410000-0x0000000005411000-memory.dmpFilesize
4KB
-
memory/2252-25-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/2872-36-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/2872-33-0x0000000004D90000-0x0000000004D91000-memory.dmpFilesize
4KB
-
memory/3380-16-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/3380-13-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/3680-3-0x00000000046C0000-0x00000000046C1000-memory.dmpFilesize
4KB
-
memory/3680-8-0x00000000047C0000-0x00000000047C1000-memory.dmpFilesize
4KB
-
memory/3680-2-0x00000000046C0000-0x00000000046C1000-memory.dmpFilesize
4KB
-
memory/3692-9-0x0000000004370000-0x0000000004371000-memory.dmpFilesize
4KB
-
memory/3692-12-0x00000000047B0000-0x00000000047B1000-memory.dmpFilesize
4KB
-
memory/3864-45-0x0000000004580000-0x0000000004581000-memory.dmpFilesize
4KB
-
memory/3864-48-0x0000000004F30000-0x0000000004F31000-memory.dmpFilesize
4KB
-
memory/3940-123-0x0000000004AC0000-0x0000000004AC1000-memory.dmpFilesize
4KB
-
memory/3940-126-0x0000000005470000-0x0000000005471000-memory.dmpFilesize
4KB
-
memory/4092-49-0x0000000004370000-0x0000000004371000-memory.dmpFilesize
4KB
-
memory/4092-53-0x0000000004D20000-0x0000000004D21000-memory.dmpFilesize
4KB