Analysis
-
max time kernel
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 12:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SynUIexe.exe
Resource
win10v2004-20240426-en
3 signatures
300 seconds
General
-
Target
SynUIexe.exe
-
Size
168KB
-
MD5
bfab7b8f94fa3e7a63a5333fc1b42c5c
-
SHA1
4abc7c179b844066a646905972cb333dfa1763bb
-
SHA256
a92d928fece74b2713e7855d0b4789297b6ef39bbde30376e912e2913d8764a8
-
SHA512
cb2402174a24840e1932222d694a12c9b4a6b077c087d51b4406a538a232933c66770bea1ac10921969f8d911ae0fe0af705c8ad1b7be88d61789faf6d40e684
-
SSDEEP
1536:wdsu56uuMVod/HQIz6b+/vzbP60mNNNKXL7/7mG7hPKOjEPDarh76lh6Wtsmltnr:46ubb+//5mNNNKbmG94PDarpq+f4p
Score
3/10
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 2408 5000 WerFault.exe 81 5116 5000 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5000 SynUIexe.exe 5000 SynUIexe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5000 SynUIexe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SynUIexe.exe"C:\Users\Admin\AppData\Local\Temp\SynUIexe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 18162⤵
- Program crash
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 18162⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5000 -ip 50001⤵PID:2652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5000 -ip 50001⤵PID:3928