Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-05-2021 12:57
Static task
static1
Behavioral task
behavioral1
Sample
d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba.exe
Resource
win10v20210410
General
-
Target
d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba.exe
-
Size
426KB
-
MD5
eb8fcc126b19d339fc633648961a981c
-
SHA1
5261c6195cce1ca134e1407ce6effde1f1915597
-
SHA256
d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba
-
SHA512
d56efea63776e3dc5d129b76161e9b9ac5ecc3c7cefb729d471b255f6d42b0e21b5dc65dd5372b9321f17ea110743e79bd42f73dc75f62d1e20ea8fe9c34e0f8
Malware Config
Signatures
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1188 1884 WerFault.exe d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba.exe 2712 1884 WerFault.exe d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
WerFault.exeWerFault.exepid process 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 1188 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba.exepid process 1884 d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 1188 WerFault.exe Token: SeBackupPrivilege 1188 WerFault.exe Token: SeDebugPrivilege 1188 WerFault.exe Token: SeDebugPrivilege 2712 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba.exe"C:\Users\Admin\AppData\Local\Temp\d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba.exe"1⤵
- Suspicious behavior: RenamesItself
PID:1884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 3402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 4002⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba.exe
MD5eb8fcc126b19d339fc633648961a981c
SHA15261c6195cce1ca134e1407ce6effde1f1915597
SHA256d1167dc9f0ef8dd16c0b5675247f369334dff56413a2dee459c5cee3fd5a25ba
SHA512d56efea63776e3dc5d129b76161e9b9ac5ecc3c7cefb729d471b255f6d42b0e21b5dc65dd5372b9321f17ea110743e79bd42f73dc75f62d1e20ea8fe9c34e0f8