Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
27-10-2021 03:12
Static task
static1
Behavioral task
behavioral1
Sample
1db79b1d369b8b4dd896c55c7c0920dee43b9791ac7ddc14e63967c1d026eca2.exe
Resource
win10-en-20210920
General
-
Target
1db79b1d369b8b4dd896c55c7c0920dee43b9791ac7ddc14e63967c1d026eca2.exe
-
Size
506KB
-
MD5
a4c8a1ed275ccd10b5b43a09939be73e
-
SHA1
1a9a999063c4b9742957932bd2dcff726ca4cc9d
-
SHA256
1db79b1d369b8b4dd896c55c7c0920dee43b9791ac7ddc14e63967c1d026eca2
-
SHA512
6073ad53bd5a044fdf9076794900a5b4d596781f4fe6127407636b87a90e8ad2338bd4d05ced9a5177ed71bf2461d850020c7b638cabc77c434a3050da73a84a
Malware Config
Extracted
raccoon
60e59be328fbd2ebac1839ea99411dccb00a6f49
-
url4cnc
http://telegin.top/agrybirdsgamerept
http://ttmirror.top/agrybirdsgamerept
http://teletele.top/agrybirdsgamerept
http://telegalive.top/agrybirdsgamerept
http://toptelete.top/agrybirdsgamerept
http://telegraf.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3840 created 756 3840 WerFault.exe 1db79b1d369b8b4dd896c55c7c0920dee43b9791ac7ddc14e63967c1d026eca2.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3840 756 WerFault.exe 1db79b1d369b8b4dd896c55c7c0920dee43b9791ac7ddc14e63967c1d026eca2.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe 3840 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3840 WerFault.exe Token: SeBackupPrivilege 3840 WerFault.exe Token: SeDebugPrivilege 3840 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1db79b1d369b8b4dd896c55c7c0920dee43b9791ac7ddc14e63967c1d026eca2.exe"C:\Users\Admin\AppData\Local\Temp\1db79b1d369b8b4dd896c55c7c0920dee43b9791ac7ddc14e63967c1d026eca2.exe"1⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 9842⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840