Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-04-2021 15:05
Static task
static1
Behavioral task
behavioral1
Sample
46c1325f35cd5958dea23230043a5e84.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
46c1325f35cd5958dea23230043a5e84.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
46c1325f35cd5958dea23230043a5e84.exe
-
Size
526KB
-
MD5
46c1325f35cd5958dea23230043a5e84
-
SHA1
796e8b3e485625d1e052696c651ad6dd93e911cd
-
SHA256
5b5534877ef572fd9c6ae870ab966c102fee3a010c89cbb8baecc249fc03e508
-
SHA512
76f32cd141d2bb8dd514f9939e8083ad7bf19889606898c1cf6260a5322768f502061185c8b236f6560ee2dbf5465f65f8075e655403d1abf66e1b2cdc15b52a
Malware Config
Extracted
Family
raccoon
Botnet
f6a4646c17af7db77b0a5aba1906d97ffcdd34ed
Attributes
-
url4cnc
https://telete.in/jdiamond13
rc4.plain
rc4.plain
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3772 created 1892 3772 WerFault.exe 46c1325f35cd5958dea23230043a5e84.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3772 1892 WerFault.exe 46c1325f35cd5958dea23230043a5e84.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe 3772 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3772 WerFault.exe Token: SeBackupPrivilege 3772 WerFault.exe Token: SeDebugPrivilege 3772 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46c1325f35cd5958dea23230043a5e84.exe"C:\Users\Admin\AppData\Local\Temp\46c1325f35cd5958dea23230043a5e84.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 6082⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken