Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
27-10-2021 07:53
Static task
static1
Behavioral task
behavioral1
Sample
0f8f6e09e26a30c47ebcb083b8cd7c550f7635ee6e1d5bf6cf5195840eb1ee51.exe
Resource
win10-en-20211014
General
-
Target
0f8f6e09e26a30c47ebcb083b8cd7c550f7635ee6e1d5bf6cf5195840eb1ee51.exe
-
Size
570KB
-
MD5
22f1f91e99ff202aff618b171a526837
-
SHA1
d9f50499c1fb8f81697cf8eb6eb41e58f7ea23a9
-
SHA256
0f8f6e09e26a30c47ebcb083b8cd7c550f7635ee6e1d5bf6cf5195840eb1ee51
-
SHA512
2c437a5ffdb2f423cf1515cae3ce28447a3f9c2adba5e9a2139aaeb688b198a6cb3e4c55f37d10dfbe6d1f9430f48e71db4f92a7f76c6e438e2cc03daab4f201
Malware Config
Extracted
raccoon
60e59be328fbd2ebac1839ea99411dccb00a6f49
-
url4cnc
http://telegin.top/agrybirdsgamerept
http://ttmirror.top/agrybirdsgamerept
http://teletele.top/agrybirdsgamerept
http://telegalive.top/agrybirdsgamerept
http://toptelete.top/agrybirdsgamerept
http://telegraf.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4568 created 4332 4568 WerFault.exe 0f8f6e09e26a30c47ebcb083b8cd7c550f7635ee6e1d5bf6cf5195840eb1ee51.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4568 4332 WerFault.exe 0f8f6e09e26a30c47ebcb083b8cd7c550f7635ee6e1d5bf6cf5195840eb1ee51.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 4568 WerFault.exe 4568 WerFault.exe 4568 WerFault.exe 4568 WerFault.exe 4568 WerFault.exe 4568 WerFault.exe 4568 WerFault.exe 4568 WerFault.exe 4568 WerFault.exe 4568 WerFault.exe 4568 WerFault.exe 4568 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 4568 WerFault.exe Token: SeBackupPrivilege 4568 WerFault.exe Token: SeDebugPrivilege 4568 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f8f6e09e26a30c47ebcb083b8cd7c550f7635ee6e1d5bf6cf5195840eb1ee51.exe"C:\Users\Admin\AppData\Local\Temp\0f8f6e09e26a30c47ebcb083b8cd7c550f7635ee6e1d5bf6cf5195840eb1ee51.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 9282⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken