Analysis
-
max time kernel
13s -
max time network
126s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
25-08-2021 20:26
Static task
static1
Behavioral task
behavioral1
Sample
472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll
-
Size
36KB
-
MD5
b4eec11177d284bc32c20a06d0ab43fb
-
SHA1
1d28dcb836ea4727dd05372e7996ef6e25bd8fca
-
SHA256
b13ffaca4d87176cf54c5f567d24f8e509c78681c9cf55d8189936611dd58671
-
SHA512
789cc0437d7ba500faa3db9619aa4c8f627040d5405b796f21c1122212671773eeecadedcded16112e2961de9cb220226880c161bba153db438c6f69258af01b
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 636 3952 WerFault.exe 37 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 636 WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll,#11⤵PID:3952
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3952 -s 4642⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-