Analysis
-
max time kernel
162s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 13:16
Behavioral task
behavioral1
Sample
f885bb34a31ef0dbc674686bf9606f3f9a338f1302f14f884423f0da04f1009d.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f885bb34a31ef0dbc674686bf9606f3f9a338f1302f14f884423f0da04f1009d.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
f885bb34a31ef0dbc674686bf9606f3f9a338f1302f14f884423f0da04f1009d.exe
-
Size
10.1MB
-
MD5
930bc14baf162266648ee4369f507101
-
SHA1
27f61b9c7588d364758bcab6c952cd2be6ae650b
-
SHA256
f885bb34a31ef0dbc674686bf9606f3f9a338f1302f14f884423f0da04f1009d
-
SHA512
ba5653cd8babb2333d74424ffea03cf2c248e7f76ef90b92c4bbe5e9ae49199b78032d93a0926b95ae8b7d39cbc1f07e96c651a1fc587d7be0a2931268343ce5
-
SSDEEP
196608:4YcJV0uG4oVINjOPDv5KqNwn1TuuKGi/zJyAzo:UEdINCPDhKqNMKzUP
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1376-0-0x0000000000400000-0x0000000000E0F000-memory.dmp vmprotect behavioral2/memory/1376-1-0x0000000000400000-0x0000000000E0F000-memory.dmp vmprotect -
Program crash 2 IoCs
pid pid_target Process procid_target 1340 1376 WerFault.exe 83 4828 1376 WerFault.exe 83 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 740 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f885bb34a31ef0dbc674686bf9606f3f9a338f1302f14f884423f0da04f1009d.exe"C:\Users\Admin\AppData\Local\Temp\f885bb34a31ef0dbc674686bf9606f3f9a338f1302f14f884423f0da04f1009d.exe"1⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 5602⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 5642⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1376 -ip 13761⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1376 -ip 13761⤵PID:4560
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:740