Analysis

  • max time kernel
    113s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    08-05-2021 18:26

General

  • Target

    4c56a3742bed62ed44b5c45896340e0f360b92d025b999996c29dcede55c4695.exe

  • Size

    711KB

  • MD5

    ef4e9b6b1659878cc968da25b3a048e2

  • SHA1

    63505e32e7c800aa22f6fa52ad65616d68016d07

  • SHA256

    4c56a3742bed62ed44b5c45896340e0f360b92d025b999996c29dcede55c4695

  • SHA512

    be694373055c5d1cbcb7623f25630307bf9f7bb6b25fe49dddf50d60cc053ef5b83084df29ae18958957637fcdb3c9608d5fa7d0ff685df68bfe6ecf7fc36ee0

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c56a3742bed62ed44b5c45896340e0f360b92d025b999996c29dcede55c4695.exe
    "C:\Users\Admin\AppData\Local\Temp\4c56a3742bed62ed44b5c45896340e0f360b92d025b999996c29dcede55c4695.exe"
    1⤵
      PID:800
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 544
        2⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3776

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads