Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-10-2021 18:43
Static task
static1
Behavioral task
behavioral1
Sample
406905f1f0854602cbc0b49b25b881507bfe318d7864ec54a9a4a20834bbce4d.exe
Resource
win10-en-20210920
General
-
Target
406905f1f0854602cbc0b49b25b881507bfe318d7864ec54a9a4a20834bbce4d.exe
-
Size
465KB
-
MD5
e8848b4acf9254267ad6da15a14706dd
-
SHA1
5d5d13d98df72123638f9d8eb4a330f4f2d5789c
-
SHA256
406905f1f0854602cbc0b49b25b881507bfe318d7864ec54a9a4a20834bbce4d
-
SHA512
f7b7dccc92726738fd07d23a9f737af1744eac336cf318c4c9279e1be63e2221f4546e0c38c9d08fb78895f9478c494c2c59649cb5ba68944be13497d9301bb6
Malware Config
Extracted
raccoon
60e59be328fbd2ebac1839ea99411dccb00a6f49
-
url4cnc
http://telegin.top/agrybirdsgamerept
http://ttmirror.top/agrybirdsgamerept
http://teletele.top/agrybirdsgamerept
http://telegalive.top/agrybirdsgamerept
http://toptelete.top/agrybirdsgamerept
http://telegraf.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4572 created 4300 4572 WerFault.exe 406905f1f0854602cbc0b49b25b881507bfe318d7864ec54a9a4a20834bbce4d.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4572 4300 WerFault.exe 406905f1f0854602cbc0b49b25b881507bfe318d7864ec54a9a4a20834bbce4d.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 4572 WerFault.exe Token: SeBackupPrivilege 4572 WerFault.exe Token: SeDebugPrivilege 4572 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\406905f1f0854602cbc0b49b25b881507bfe318d7864ec54a9a4a20834bbce4d.exe"C:\Users\Admin\AppData\Local\Temp\406905f1f0854602cbc0b49b25b881507bfe318d7864ec54a9a4a20834bbce4d.exe"1⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 9722⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572