Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
03-07-2021 08:16
Static task
static1
Behavioral task
behavioral1
Sample
c1b1b337c38d525e3430e3c1e90ae355.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
c1b1b337c38d525e3430e3c1e90ae355.exe
-
Size
416KB
-
MD5
c1b1b337c38d525e3430e3c1e90ae355
-
SHA1
93095f8cb0d9c047eaaa28441174824e0a60f69d
-
SHA256
549294145687d56bced5ae786f90fd4ec2aa4730e80f31f3b886e3a603f1e47e
-
SHA512
7ba20b2ac63f87a0c25d5edb61425a16040c65b0fe2cfa21e654f5a4bec070d1525b47c217afe713fec85d435c7292f48e85924e28585553a400610fa186c980
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3924 created 3560 3924 WerFault.exe 65 -
DarkVNC Payload 2 IoCs
resource yara_rule behavioral2/memory/3560-116-0x0000000000400000-0x0000000000612000-memory.dmp darkvnc behavioral2/memory/2224-118-0x000001BDDC890000-0x000001BDDC95A000-memory.dmp darkvnc -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3560 set thread context of 2224 3560 c1b1b337c38d525e3430e3c1e90ae355.exe 75 -
Program crash 1 IoCs
pid pid_target Process procid_target 3924 3560 WerFault.exe 65 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3560 c1b1b337c38d525e3430e3c1e90ae355.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3924 WerFault.exe Token: SeBackupPrivilege 3924 WerFault.exe Token: SeDebugPrivilege 3924 WerFault.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3560 wrote to memory of 2224 3560 c1b1b337c38d525e3430e3c1e90ae355.exe 75 PID 3560 wrote to memory of 2224 3560 c1b1b337c38d525e3430e3c1e90ae355.exe 75 PID 3560 wrote to memory of 2224 3560 c1b1b337c38d525e3430e3c1e90ae355.exe 75 PID 3560 wrote to memory of 2224 3560 c1b1b337c38d525e3430e3c1e90ae355.exe 75 PID 3560 wrote to memory of 2224 3560 c1b1b337c38d525e3430e3c1e90ae355.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b1b337c38d525e3430e3c1e90ae355.exe"C:\Users\Admin\AppData\Local\Temp\c1b1b337c38d525e3430e3c1e90ae355.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe2⤵PID:2224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 5202⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924
-