Analysis
-
max time kernel
125s -
max time network
127s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
b2ca61bfbec4c1a22719e6a168bb30f8a7a35f4564c365dea5259f33627e5b33.exe
Resource
win10-en-20211014
General
-
Target
b2ca61bfbec4c1a22719e6a168bb30f8a7a35f4564c365dea5259f33627e5b33.exe
-
Size
589KB
-
MD5
2806e93b8304e45a40c723d38d425218
-
SHA1
2aede490ace7b6d6888e59381ab99fdb65642bc7
-
SHA256
b2ca61bfbec4c1a22719e6a168bb30f8a7a35f4564c365dea5259f33627e5b33
-
SHA512
3952404f984d63219aab94f93218bfb83b4747c42a4a136c03fbd5501cded285847e4e9b64c02be9d7c075a0ff7d1f02aaedf19e04763b52758997e0cc666e87
Malware Config
Extracted
raccoon
60e59be328fbd2ebac1839ea99411dccb00a6f49
-
url4cnc
http://telegin.top/agrybirdsgamerept
http://ttmirror.top/agrybirdsgamerept
http://teletele.top/agrybirdsgamerept
http://telegalive.top/agrybirdsgamerept
http://toptelete.top/agrybirdsgamerept
http://telegraf.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2276 created 2460 2276 WerFault.exe b2ca61bfbec4c1a22719e6a168bb30f8a7a35f4564c365dea5259f33627e5b33.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2276 2460 WerFault.exe b2ca61bfbec4c1a22719e6a168bb30f8a7a35f4564c365dea5259f33627e5b33.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe 2276 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2276 WerFault.exe Token: SeBackupPrivilege 2276 WerFault.exe Token: SeDebugPrivilege 2276 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2ca61bfbec4c1a22719e6a168bb30f8a7a35f4564c365dea5259f33627e5b33.exe"C:\Users\Admin\AppData\Local\Temp\b2ca61bfbec4c1a22719e6a168bb30f8a7a35f4564c365dea5259f33627e5b33.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 8762⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken