Analysis
-
max time kernel
85s -
max time network
110s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
29-09-2021 11:24
Static task
static1
Behavioral task
behavioral1
Sample
COMMANDE EN VRAC.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
COMMANDE EN VRAC.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
COMMANDE EN VRAC.exe
-
Size
294KB
-
MD5
cb98b8cb0d393f8139a8b472e1df64f1
-
SHA1
f57893ee437446d4fb40e6a0642d1cf05965fb72
-
SHA256
bbedcbe77cff074e73d9265b5cd4dfaba57b573065b1cb36e7944880a54239e9
-
SHA512
7f3414181e779202cad55f689cec2b0b5d9c4b5904cbbdd7548941149b217f5e26e28c7f3191bd5457627813ad1d53a6d70b90158d7ac73f394f88dbccab4178
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4312 created 3608 4312 WerFault.exe COMMANDE EN VRAC.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4312 3608 WerFault.exe COMMANDE EN VRAC.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe 4312 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 4312 WerFault.exe Token: SeBackupPrivilege 4312 WerFault.exe Token: SeDebugPrivilege 4312 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\COMMANDE EN VRAC.exe"C:\Users\Admin\AppData\Local\Temp\COMMANDE EN VRAC.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 2482⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3608-115-0x00000000004E0000-0x000000000062A000-memory.dmpFilesize
1.3MB