Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
03-12-2021 02:14
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER SEELB435.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PURCHASE ORDER SEELB435.exe
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
PURCHASE ORDER SEELB435.exe
-
Size
463KB
-
MD5
69d915d390d2a49b48a2a06eaa3fba07
-
SHA1
6d98e1bce382887011d2691d25dc71b05515004d
-
SHA256
df461f850794a76cdf05708ef171f683e525b2475b1befadc1bccf4571553f6c
-
SHA512
e5c273d04fdc950a0ea5196948e0fd4c592d92e0c5eb7e60f1c8088180c9dde69f96a7d388999993f8381c9d4fc0f37c316c4178836a2f9d6039b08b03fbee81
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1376 1916 WerFault.exe PURCHASE ORDER SEELB435.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
PURCHASE ORDER SEELB435.exeWerFault.exepid process 1916 PURCHASE ORDER SEELB435.exe 1376 WerFault.exe 1376 WerFault.exe 1376 WerFault.exe 1376 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PURCHASE ORDER SEELB435.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1916 PURCHASE ORDER SEELB435.exe Token: SeDebugPrivilege 1376 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
PURCHASE ORDER SEELB435.exedescription pid process target process PID 1916 wrote to memory of 1376 1916 PURCHASE ORDER SEELB435.exe WerFault.exe PID 1916 wrote to memory of 1376 1916 PURCHASE ORDER SEELB435.exe WerFault.exe PID 1916 wrote to memory of 1376 1916 PURCHASE ORDER SEELB435.exe WerFault.exe PID 1916 wrote to memory of 1376 1916 PURCHASE ORDER SEELB435.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER SEELB435.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER SEELB435.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 7042⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1376-61-0x0000000000000000-mapping.dmp
-
memory/1376-62-0x0000000000380000-0x0000000000381000-memory.dmpFilesize
4KB
-
memory/1916-55-0x0000000000340000-0x0000000000341000-memory.dmpFilesize
4KB
-
memory/1916-57-0x0000000076231000-0x0000000076233000-memory.dmpFilesize
8KB
-
memory/1916-58-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB
-
memory/1916-59-0x00000000002F0000-0x00000000002F8000-memory.dmpFilesize
32KB
-
memory/1916-60-0x0000000004F40000-0x0000000004FA9000-memory.dmpFilesize
420KB