Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    21-03-2021 18:51

General

  • Target

    460c76892a939c1b7d563171c3b2d349.exe

  • Size

    10KB

  • MD5

    460c76892a939c1b7d563171c3b2d349

  • SHA1

    267857f6c93b33f87c7d3fd109d22fe3e7e33913

  • SHA256

    6851d9ae6d9c3405a7fb92d93ec0bd87e3c52a6903e29ab55f2d7b779559d4b7

  • SHA512

    f2e559032b4d8cdcd020e5b62fbdbe163fabe9af0c1f518eb0b33881c491c0a545297d2403a488dae752703d94ce5afa66fbfa63901bf875a5d2c0b9eee1d0ea

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\460c76892a939c1b7d563171c3b2d349.exe
    "C:\Users\Admin\AppData\Local\Temp\460c76892a939c1b7d563171c3b2d349.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1596 -s 1472
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1260-6-0x0000000000000000-mapping.dmp

  • memory/1260-7-0x000007FEFBA81000-0x000007FEFBA83000-memory.dmp

    Filesize

    8KB

  • memory/1260-8-0x0000000001E70000-0x0000000001E81000-memory.dmp

    Filesize

    68KB

  • memory/1260-9-0x0000000001DA0000-0x0000000001DA1000-memory.dmp

    Filesize

    4KB

  • memory/1596-2-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB

  • memory/1596-3-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/1596-5-0x000000001AF50000-0x000000001AF52000-memory.dmp

    Filesize

    8KB