Analysis
-
max time kernel
98s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
18-02-2020 15:18
Static task
static1
Behavioral task
behavioral1
Sample
4wvbd5ykxwfxg.exe
Resource
win7v200217
windows7_x64
0 signatures
0 seconds
General
-
Target
4wvbd5ykxwfxg.exe
-
Size
5.5MB
-
MD5
45a02b429739d0d3c02e972ec3964eb1
-
SHA1
2842b9f8f61c85543545946973b4b750b070fde1
-
SHA256
82214d13917ce35d7a08d47bcd2a053ad385d1f13fed5d06507eeb9471c918b2
-
SHA512
fded983fdf09401ce0f2633e9dd55623692dc4b29d49ebf49bffabd76e009f8946eb8a35ce2cfcfb5eec5542010229e66ce6fd38b9bae6f82ccc6d5510ae7562
Malware Config
Extracted
Family
raccoon
Botnet
89379f5371f470435351b0d002d50f28a65fff02
C2
http://104.155.44.42/gate/log.php
Attributes
-
url4cnc
https://drive.google.com/uc?export=download&id=1jN5ZmsLRZEQEtxsUIIVXnSOKaqBdnX6Z
rc4.plain
rc4.plain
Signatures
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4wvbd5ykxwfxg.exedescription pid process target process PID 3768 wrote to memory of 3112 3768 4wvbd5ykxwfxg.exe RegAsm.exe PID 3768 wrote to memory of 3112 3768 4wvbd5ykxwfxg.exe RegAsm.exe PID 3768 wrote to memory of 3112 3768 4wvbd5ykxwfxg.exe RegAsm.exe PID 3768 wrote to memory of 3112 3768 4wvbd5ykxwfxg.exe RegAsm.exe PID 3768 wrote to memory of 3112 3768 4wvbd5ykxwfxg.exe RegAsm.exe PID 3768 wrote to memory of 3112 3768 4wvbd5ykxwfxg.exe RegAsm.exe PID 3768 wrote to memory of 3112 3768 4wvbd5ykxwfxg.exe RegAsm.exe PID 3768 wrote to memory of 3112 3768 4wvbd5ykxwfxg.exe RegAsm.exe PID 3768 wrote to memory of 3112 3768 4wvbd5ykxwfxg.exe RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4wvbd5ykxwfxg.exedescription pid process target process PID 3768 set thread context of 3112 3768 4wvbd5ykxwfxg.exe RegAsm.exe -
Loads dropped DLL 1 IoCs
Processes:
RegAsm.exepid process 3112 RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3476 3112 WerFault.exe RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3476 WerFault.exe Token: SeBackupPrivilege 3476 WerFault.exe Token: SeDebugPrivilege 3476 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe 3476 WerFault.exe -
Reads browser user data or profiles (possible credential harvesting) 2 TTPs
Processes
-
C:\Users\Admin\AppData\Local\Temp\4wvbd5ykxwfxg.exe"C:\Users\Admin\AppData\Local\Temp\4wvbd5ykxwfxg.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:3768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
PID:3112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 17403⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-