Analysis
-
max time kernel
75s -
max time network
136s -
platform
windows10_x64 -
resource
win10-en -
submitted
15-09-2021 07:06
Static task
static1
Behavioral task
behavioral1
Sample
450f463616026025f68295b9a3dd365f.exe
Resource
win7-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
450f463616026025f68295b9a3dd365f.exe
Resource
win10-en
windows10_x64
0 signatures
0 seconds
General
-
Target
450f463616026025f68295b9a3dd365f.exe
-
Size
779KB
-
MD5
450f463616026025f68295b9a3dd365f
-
SHA1
440c0e1d874ebd9c3f86b672f24b39d7c857baa3
-
SHA256
c96f0650573130180a039e7b9d66d11e18c97c9fe96c732f2d5fdbcb05a140eb
-
SHA512
7fb9e37bb037f48779b508863f9dacd9714214adc4642619978b9cf90cd19311ad0f122512a41e4d91ad55bd25d7f076266e93f60cfb9df7e8cf325149d4b76f
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4196 2980 WerFault.exe 450f463616026025f68295b9a3dd365f.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe 4196 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 4196 WerFault.exe Token: SeBackupPrivilege 4196 WerFault.exe Token: SeDebugPrivilege 4196 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
450f463616026025f68295b9a3dd365f.exedescription pid process target process PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe PID 3996 wrote to memory of 2980 3996 450f463616026025f68295b9a3dd365f.exe 450f463616026025f68295b9a3dd365f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\450f463616026025f68295b9a3dd365f.exe"C:\Users\Admin\AppData\Local\Temp\450f463616026025f68295b9a3dd365f.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\450f463616026025f68295b9a3dd365f.exeC:\Users\Admin\AppData\Local\Temp\450f463616026025f68295b9a3dd365f.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 3883⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2980-117-0x0000000000000000-mapping.dmp
-
memory/2980-121-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/2980-122-0x0000000000610000-0x0000000000611000-memory.dmpFilesize
4KB
-
memory/3996-115-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/3996-118-0x0000000010410000-0x000000001042B000-memory.dmpFilesize
108KB