Analysis
-
max time kernel
79s -
max time network
125s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
12934094ed155603f07a6d5480953b6d1a740595a249b6e749a9de1d1edd3b23.exe
Resource
win10-en-20210920
General
-
Target
12934094ed155603f07a6d5480953b6d1a740595a249b6e749a9de1d1edd3b23.exe
-
Size
589KB
-
MD5
fdbf59b0dafcb58177200c475b5ab9e4
-
SHA1
a74ff4b4598d4bfb15d5ece41973f60f8c077581
-
SHA256
12934094ed155603f07a6d5480953b6d1a740595a249b6e749a9de1d1edd3b23
-
SHA512
4395d6f6c31c3162f940430eb1604ee044ec7c05831b3ab8b856a7db8abd3ea54be8c0d0b837e24cf286851413105dbb5f15c26c2e4ca663688c8598a57abde2
Malware Config
Extracted
raccoon
60e59be328fbd2ebac1839ea99411dccb00a6f49
-
url4cnc
http://telegin.top/agrybirdsgamerept
http://ttmirror.top/agrybirdsgamerept
http://teletele.top/agrybirdsgamerept
http://telegalive.top/agrybirdsgamerept
http://toptelete.top/agrybirdsgamerept
http://telegraf.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3972 created 3912 3972 WerFault.exe 12934094ed155603f07a6d5480953b6d1a740595a249b6e749a9de1d1edd3b23.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3972 3912 WerFault.exe 12934094ed155603f07a6d5480953b6d1a740595a249b6e749a9de1d1edd3b23.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 3972 WerFault.exe 3972 WerFault.exe 3972 WerFault.exe 3972 WerFault.exe 3972 WerFault.exe 3972 WerFault.exe 3972 WerFault.exe 3972 WerFault.exe 3972 WerFault.exe 3972 WerFault.exe 3972 WerFault.exe 3972 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3972 WerFault.exe Token: SeBackupPrivilege 3972 WerFault.exe Token: SeDebugPrivilege 3972 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12934094ed155603f07a6d5480953b6d1a740595a249b6e749a9de1d1edd3b23.exe"C:\Users\Admin\AppData\Local\Temp\12934094ed155603f07a6d5480953b6d1a740595a249b6e749a9de1d1edd3b23.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 9802⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken