Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    01-12-2021 13:44

General

  • Target

    Kommerciel faktura.1-12-2021.exe

  • Size

    671KB

  • MD5

    3b75a68ee1d760c02018a9713749a308

  • SHA1

    4e7c21ac262daf128491a3536ee0465462f25d01

  • SHA256

    a4d3d2100382df9f112a4c56a6487e3d7553e93f1bc819f5241a51364968ed9e

  • SHA512

    223037e55a2ef0498e0821f69af321519d4ab9ee74178485320a37617ab3df6967a663d6b2e9439d9a49cc6d486446ab314808e86d325226d0ea9f3ec9106822

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kommerciel faktura.1-12-2021.exe
    "C:\Users\Admin\AppData\Local\Temp\Kommerciel faktura.1-12-2021.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 672
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/640-60-0x0000000000000000-mapping.dmp
  • memory/640-61-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/1932-55-0x0000000000C70000-0x0000000000C71000-memory.dmp
    Filesize

    4KB

  • memory/1932-57-0x0000000000420000-0x0000000000426000-memory.dmp
    Filesize

    24KB

  • memory/1932-58-0x0000000004740000-0x0000000004741000-memory.dmp
    Filesize

    4KB

  • memory/1932-59-0x0000000004970000-0x00000000049DA000-memory.dmp
    Filesize

    424KB