Analysis
-
max time kernel
149s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 17:13
Static task
static1
Behavioral task
behavioral1
Sample
BPL_1057230.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
BPL_1057230.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
BPL_1057230.exe
-
Size
187KB
-
MD5
72048fbaab48b29537a9b8b6af6bd37d
-
SHA1
fb253b22ae678164dad4de1f8f472a1338c8582a
-
SHA256
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087
-
SHA512
8909e498201a610020fd59e7bfc1340da71dc0ca8a4205adaba12151dd50a0cb0e88b0b358a361ecec5d6cefa5708bc7a19dea21e5b9d857d1057fce27640601
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 5020 3416 WerFault.exe 80 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
BPL_1057230.exedescription pid Process Token: SeDebugPrivilege 3416 BPL_1057230.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BPL_1057230.exe"C:\Users\Admin\AppData\Local\Temp\BPL_1057230.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 15722⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3416 -ip 34161⤵PID:4244