Resubmissions
27-02-2020 14:32
200227-j9j97brmwa 1024-02-2020 18:10
200224-72rcb5pv46 1018-02-2020 14:57
200218-ab6jp3b1nx 10Analysis
-
max time kernel
109s -
max time network
113s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
27-02-2020 14:32
Static task
static1
Behavioral task
behavioral1
Sample
97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe
Resource
win7v200217
General
-
Target
97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe
-
Size
637KB
-
MD5
f8e8da4bcb00ac0f4c52392719c7361e
-
SHA1
accedfe263fca73d78eab360f7afe9d131b062bd
-
SHA256
97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e
-
SHA512
aa3614c91419afdcfb7f8ae0bc603580289434d439d0f6fed31c5ea4ab97ba7beb5973f7560f4f12ea0bdf5cea842ff84cf8f587b7bf79e182ba378df22a07e5
Malware Config
Extracted
raccoon
89379f5371f470435351b0d002d50f28a65fff02
http://104.155.44.42/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=1jN5ZmsLRZEQEtxsUIIVXnSOKaqBdnX6Z
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exedescription pid process target process PID 4040 set thread context of 3624 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe RegAsm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exedescription pid process target process PID 4040 wrote to memory of 3624 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe RegAsm.exe PID 4040 wrote to memory of 3624 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe RegAsm.exe PID 4040 wrote to memory of 3624 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe RegAsm.exe PID 4040 wrote to memory of 3624 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe RegAsm.exe PID 4040 wrote to memory of 3624 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe RegAsm.exe PID 4040 wrote to memory of 3624 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe RegAsm.exe PID 4040 wrote to memory of 3624 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe RegAsm.exe PID 4040 wrote to memory of 3624 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe RegAsm.exe PID 4040 wrote to memory of 3624 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exedescription pid process Token: SeDebugPrivilege 4040 97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe"C:\Users\Admin\AppData\Local\Temp\97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3624
-