Analysis
-
max time kernel
40s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-11-2020 11:36
Static task
static1
Behavioral task
behavioral1
Sample
53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe
-
Size
514KB
-
MD5
9ae5b3d8924d251ed4799a1223da2aac
-
SHA1
0813b6ac59813919c1942982689af928134810b3
-
SHA256
53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90
-
SHA512
23c4a88b7437a87c79b5d7fe85a3ee5720295923a846a6631b4db6c48ddbf26524f70676ed91c88df654dc1bd7d8910d37bcc6845847ae7a03f2ce69d439044e
Malware Config
Signatures
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3440 3372 WerFault.exe 53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe 3356 3372 WerFault.exe 53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe 700 3372 WerFault.exe 53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe 2940 3372 WerFault.exe 53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe 3532 3372 WerFault.exe 53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe 1832 3372 WerFault.exe 53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe 4052 3372 WerFault.exe 53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe -
Suspicious behavior: EnumeratesProcesses 98 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 3532 WerFault.exe 3532 WerFault.exe 3532 WerFault.exe 3532 WerFault.exe 3532 WerFault.exe 3532 WerFault.exe 3532 WerFault.exe 3532 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 3440 WerFault.exe Token: SeBackupPrivilege 3440 WerFault.exe Token: SeDebugPrivilege 3440 WerFault.exe Token: SeDebugPrivilege 3356 WerFault.exe Token: SeDebugPrivilege 700 WerFault.exe Token: SeDebugPrivilege 2940 WerFault.exe Token: SeDebugPrivilege 3532 WerFault.exe Token: SeDebugPrivilege 1832 WerFault.exe Token: SeDebugPrivilege 4052 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe"C:\Users\Admin\AppData\Local\Temp\53f66b5a1716d51818eb57248c8900f30966bfa7cc3fc53faf0f51c48b7daa90.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 7482⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 8162⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 8202⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 8842⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 11922⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 12042⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 12802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/700-10-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB
-
memory/700-13-0x0000000005620000-0x0000000005621000-memory.dmpFilesize
4KB
-
memory/1832-29-0x0000000005520000-0x0000000005521000-memory.dmpFilesize
4KB
-
memory/1832-26-0x0000000004BF0000-0x0000000004BF1000-memory.dmpFilesize
4KB
-
memory/2940-14-0x00000000049F0000-0x00000000049F1000-memory.dmpFilesize
4KB
-
memory/2940-17-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/3356-6-0x0000000004E40000-0x0000000004E41000-memory.dmpFilesize
4KB
-
memory/3356-9-0x0000000005470000-0x0000000005471000-memory.dmpFilesize
4KB
-
memory/3372-25-0x00000000043B0000-0x00000000043B1000-memory.dmpFilesize
4KB
-
memory/3372-1-0x00000000042A0000-0x00000000042A1000-memory.dmpFilesize
4KB
-
memory/3372-0-0x0000000002386000-0x0000000002387000-memory.dmpFilesize
4KB
-
memory/3440-5-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/3440-3-0x0000000004CD0000-0x0000000004CD1000-memory.dmpFilesize
4KB
-
memory/3440-2-0x0000000004CD0000-0x0000000004CD1000-memory.dmpFilesize
4KB
-
memory/3532-24-0x0000000005660000-0x0000000005661000-memory.dmpFilesize
4KB
-
memory/3532-21-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/4052-30-0x0000000004070000-0x0000000004071000-memory.dmpFilesize
4KB
-
memory/4052-33-0x00000000048A0000-0x00000000048A1000-memory.dmpFilesize
4KB