Analysis
-
max time kernel
67s -
max time network
45s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-07-2021 13:01
Static task
static1
Behavioral task
behavioral1
Sample
495edc6456f3c1d7dcdf839ec8a1fc70.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
495edc6456f3c1d7dcdf839ec8a1fc70.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
495edc6456f3c1d7dcdf839ec8a1fc70.exe
-
Size
935KB
-
MD5
495edc6456f3c1d7dcdf839ec8a1fc70
-
SHA1
fe30c475e506a76be7ea15c4f529938062718276
-
SHA256
3504fe4b0e2d093c366cffa43ceb37026d7a5f8e35498aa7945556c77ecce731
-
SHA512
b2122cd4b6a1b1f46f8e3b970ccd786ca6a07a554772a7ddebab9d7dc42ea7a12288debdccc3ec5af63fd6d707b3e804e3e13cfd2d4fbe7e2aec11abea4e1b1a
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1072 2004 WerFault.exe 24 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1072 WerFault.exe 1072 WerFault.exe 1072 WerFault.exe 1072 WerFault.exe 1072 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1072 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1072 2004 495edc6456f3c1d7dcdf839ec8a1fc70.exe 29 PID 2004 wrote to memory of 1072 2004 495edc6456f3c1d7dcdf839ec8a1fc70.exe 29 PID 2004 wrote to memory of 1072 2004 495edc6456f3c1d7dcdf839ec8a1fc70.exe 29 PID 2004 wrote to memory of 1072 2004 495edc6456f3c1d7dcdf839ec8a1fc70.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\495edc6456f3c1d7dcdf839ec8a1fc70.exe"C:\Users\Admin\AppData\Local\Temp\495edc6456f3c1d7dcdf839ec8a1fc70.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 6282⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
-