Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 14:11
Static task
static1
Behavioral task
behavioral1
Sample
fa79ced0133269dab87c00c2cb7a128e36cad7818ab08e51a01b092effbe8b88.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa79ced0133269dab87c00c2cb7a128e36cad7818ab08e51a01b092effbe8b88.exe
Resource
win10v2004-20220901-en
General
-
Target
fa79ced0133269dab87c00c2cb7a128e36cad7818ab08e51a01b092effbe8b88.exe
-
Size
2.1MB
-
MD5
0aad58b82349fcc2f8122d09430d930b
-
SHA1
214abbc52035729368243a17099c51c35c51d280
-
SHA256
fa79ced0133269dab87c00c2cb7a128e36cad7818ab08e51a01b092effbe8b88
-
SHA512
c63f4cea9d69a5c374c677c582eceb82fa8668d18f7cea9e7b64443ad602834b95b1aa992e179cf70807fe1dfc6cefb795dcb8d3d7be8cf03ec0dbabd4f39b6f
-
SSDEEP
49152:2pW4aXyJS8BeoS5B6tos3AR66KddeHxlEirx6:H47MjxsM6t0RlESx6
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3380 2164 WerFault.exe fa79ced0133269dab87c00c2cb7a128e36cad7818ab08e51a01b092effbe8b88.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fa79ced0133269dab87c00c2cb7a128e36cad7818ab08e51a01b092effbe8b88.exedescription pid process Token: SeDebugPrivilege 2164 fa79ced0133269dab87c00c2cb7a128e36cad7818ab08e51a01b092effbe8b88.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa79ced0133269dab87c00c2cb7a128e36cad7818ab08e51a01b092effbe8b88.exe"C:\Users\Admin\AppData\Local\Temp\fa79ced0133269dab87c00c2cb7a128e36cad7818ab08e51a01b092effbe8b88.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 14442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2164 -ip 21641⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2164-132-0x00000000001E0000-0x0000000000402000-memory.dmpFilesize
2.1MB