Analysis
-
max time kernel
126s -
max time network
18s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15-09-2021 06:56
Static task
static1
Behavioral task
behavioral1
Sample
83f51a31a3b9ed0a4087aca907befdeb.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
83f51a31a3b9ed0a4087aca907befdeb.exe
-
Size
835KB
-
MD5
83f51a31a3b9ed0a4087aca907befdeb
-
SHA1
f3805488954d7bdb7b1d83ef77968ae59170a1e9
-
SHA256
d15ba749c366334fd969a221a70a8f567efb1ae5db0bdbceddb166301585806e
-
SHA512
3e5212b2de5b2fe9ca162625410559acacb11e7d04d431ff5af72662489efa20131f3648390edcf6bb97771683c26d4c47951ded7ebce072b03a67e25b1bc3b3
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1200 684 WerFault.exe 83f51a31a3b9ed0a4087aca907befdeb.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WerFault.exepid process 1200 WerFault.exe 1200 WerFault.exe 1200 WerFault.exe 1200 WerFault.exe 1200 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1200 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1200 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
83f51a31a3b9ed0a4087aca907befdeb.exedescription pid process target process PID 684 wrote to memory of 1200 684 83f51a31a3b9ed0a4087aca907befdeb.exe WerFault.exe PID 684 wrote to memory of 1200 684 83f51a31a3b9ed0a4087aca907befdeb.exe WerFault.exe PID 684 wrote to memory of 1200 684 83f51a31a3b9ed0a4087aca907befdeb.exe WerFault.exe PID 684 wrote to memory of 1200 684 83f51a31a3b9ed0a4087aca907befdeb.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\83f51a31a3b9ed0a4087aca907befdeb.exe"C:\Users\Admin\AppData\Local\Temp\83f51a31a3b9ed0a4087aca907befdeb.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 6162⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/684-60-0x0000000000880000-0x0000000000881000-memory.dmpFilesize
4KB
-
memory/684-61-0x0000000004D00000-0x0000000004D01000-memory.dmpFilesize
4KB
-
memory/1200-62-0x0000000000000000-mapping.dmp
-
memory/1200-63-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB