Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 17:30
Static task
static1
Behavioral task
behavioral1
Sample
1d9871989dcdfb43beb4d9ee6c44d13c60e489c347d8125c87faa3b14d696285.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
1d9871989dcdfb43beb4d9ee6c44d13c60e489c347d8125c87faa3b14d696285.exe
-
Size
512KB
-
MD5
d09a76976c1487218616dbabd20396e5
-
SHA1
6aab209f6b204b8d835b817bd35b124de72ddd12
-
SHA256
1d9871989dcdfb43beb4d9ee6c44d13c60e489c347d8125c87faa3b14d696285
-
SHA512
5a0fbc0c61a9cd3feb03f424759c1df9a5f63287fceb6322641545baaed8fac5cfd16bcfd7c2d79e09738f92f623687f76b877a7742bdbb2a6926cac3ce2704d
Malware Config
Extracted
Family
raccoon
Botnet
887a0ffaca448362277f2227182491216b734133
Attributes
-
url4cnc
http://telegka.top/jdiamond13
http://telegin.top/jdiamond13
https://t.me/jdiamond13
rc4.plain
rc4.plain
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2800 created 3500 2800 WerFault.exe 1d9871989dcdfb43beb4d9ee6c44d13c60e489c347d8125c87faa3b14d696285.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2800 3500 WerFault.exe 1d9871989dcdfb43beb4d9ee6c44d13c60e489c347d8125c87faa3b14d696285.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2800 WerFault.exe Token: SeBackupPrivilege 2800 WerFault.exe Token: SeDebugPrivilege 2800 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d9871989dcdfb43beb4d9ee6c44d13c60e489c347d8125c87faa3b14d696285.exe"C:\Users\Admin\AppData\Local\Temp\1d9871989dcdfb43beb4d9ee6c44d13c60e489c347d8125c87faa3b14d696285.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 9162⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken