Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
06-12-2021 12:07
Static task
static1
Behavioral task
behavioral1
Sample
eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
General
-
Target
eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4.exe
-
Size
532KB
-
MD5
5cc6fc2f78336352bac6975edafa2c1a
-
SHA1
ccb86ddabe85e1ef348ff3dc5f24577040da5f28
-
SHA256
eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4
-
SHA512
2625083acdf607189a41b24f9da874f37714d43318718b2e5291e0fb0651462ffee4c2b11f4f69884f85d222a0d8955158dacad0afb10226c92aa9d9b78b33a7
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1904 1908 WerFault.exe eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1904 WerFault.exe 1904 WerFault.exe 1904 WerFault.exe 1904 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1904 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4.exedescription pid process target process PID 1908 wrote to memory of 1904 1908 eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4.exe WerFault.exe PID 1908 wrote to memory of 1904 1908 eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4.exe WerFault.exe PID 1908 wrote to memory of 1904 1908 eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4.exe WerFault.exe PID 1908 wrote to memory of 1904 1908 eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4.exe"C:\Users\Admin\AppData\Local\Temp\eec88ca50dfe87580123cd0d582b1196bc974efdbecb256d5e59dc52ca6d48d4.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 6642⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1904-61-0x0000000000000000-mapping.dmp
-
memory/1904-62-0x0000000000890000-0x0000000000891000-memory.dmpFilesize
4KB
-
memory/1908-55-0x0000000000B50000-0x0000000000B51000-memory.dmpFilesize
4KB
-
memory/1908-57-0x0000000074F01000-0x0000000074F03000-memory.dmpFilesize
8KB
-
memory/1908-58-0x0000000000680000-0x0000000000686000-memory.dmpFilesize
24KB
-
memory/1908-59-0x00000000005F0000-0x00000000005F1000-memory.dmpFilesize
4KB
-
memory/1908-60-0x0000000004C70000-0x0000000004CB4000-memory.dmpFilesize
272KB