Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 12:29
Static task
static1
Behavioral task
behavioral1
Sample
9ae5b3d8924d251ed4799a1223da2aac.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
9ae5b3d8924d251ed4799a1223da2aac.exe
-
Size
514KB
-
MD5
f419548a046f3238df9d95d40e3a8fdd
-
SHA1
76fda035703781cfe5f785b8f230e7db6eef2abf
-
SHA256
86c1ba04c2400da557124c31d3366eb792080a254e6166e7a426a27b0cd16693
-
SHA512
cca8b94d53abde68c7fcf83fa246674cea3c607e65164d59824ec940b720560c33574c1e2e40c811667f9c685d61017eb27ca03bf671a159c4d8066ccf12f36d
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4064 created 648 4064 WerFault.exe 9ae5b3d8924d251ed4799a1223da2aac.exe -
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2680 648 WerFault.exe 9ae5b3d8924d251ed4799a1223da2aac.exe 1436 648 WerFault.exe 9ae5b3d8924d251ed4799a1223da2aac.exe 1976 648 WerFault.exe 9ae5b3d8924d251ed4799a1223da2aac.exe 4088 648 WerFault.exe 9ae5b3d8924d251ed4799a1223da2aac.exe 992 648 WerFault.exe 9ae5b3d8924d251ed4799a1223da2aac.exe 1924 648 WerFault.exe 9ae5b3d8924d251ed4799a1223da2aac.exe 4064 648 WerFault.exe 9ae5b3d8924d251ed4799a1223da2aac.exe -
Suspicious behavior: EnumeratesProcesses 98 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1436 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 992 WerFault.exe 992 WerFault.exe 992 WerFault.exe 992 WerFault.exe 992 WerFault.exe 992 WerFault.exe 992 WerFault.exe 992 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 2680 WerFault.exe Token: SeBackupPrivilege 2680 WerFault.exe Token: SeDebugPrivilege 2680 WerFault.exe Token: SeDebugPrivilege 1436 WerFault.exe Token: SeDebugPrivilege 1976 WerFault.exe Token: SeDebugPrivilege 4088 WerFault.exe Token: SeDebugPrivilege 992 WerFault.exe Token: SeDebugPrivilege 1924 WerFault.exe Token: SeDebugPrivilege 4064 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ae5b3d8924d251ed4799a1223da2aac.exe"C:\Users\Admin\AppData\Local\Temp\9ae5b3d8924d251ed4799a1223da2aac.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 7402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 8162⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 8962⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 9082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 11922⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 11442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 6442⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/648-0-0x0000000002536000-0x0000000002537000-memory.dmpFilesize
4KB
-
memory/648-1-0x0000000004250000-0x0000000004251000-memory.dmpFilesize
4KB
-
memory/992-72-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/992-69-0x0000000004820000-0x0000000004821000-memory.dmpFilesize
4KB
-
memory/1436-57-0x00000000043F0000-0x00000000043F1000-memory.dmpFilesize
4KB
-
memory/1436-60-0x0000000004930000-0x0000000004931000-memory.dmpFilesize
4KB
-
memory/1924-76-0x00000000053B0000-0x00000000053B1000-memory.dmpFilesize
4KB
-
memory/1924-73-0x0000000004C70000-0x0000000004C71000-memory.dmpFilesize
4KB
-
memory/1976-64-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/1976-61-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/2680-6-0x0000000005360000-0x0000000005361000-memory.dmpFilesize
4KB
-
memory/2680-3-0x0000000004CB0000-0x0000000004CB1000-memory.dmpFilesize
4KB
-
memory/2680-2-0x0000000004CB0000-0x0000000004CB1000-memory.dmpFilesize
4KB
-
memory/4064-77-0x0000000004620000-0x0000000004621000-memory.dmpFilesize
4KB
-
memory/4064-80-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/4088-65-0x0000000004EF0000-0x0000000004EF1000-memory.dmpFilesize
4KB
-
memory/4088-68-0x0000000005520000-0x0000000005521000-memory.dmpFilesize
4KB