Analysis
-
max time kernel
121s -
max time network
135s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
d6a71e8e02344892be0895bdb46008b4e4eb08d33bf266204babf2c0bcfdf4b9.exe
Resource
win10-en-20210920
General
-
Target
d6a71e8e02344892be0895bdb46008b4e4eb08d33bf266204babf2c0bcfdf4b9.exe
-
Size
590KB
-
MD5
d4bd31238e86010a7169460756c9c734
-
SHA1
6eba10a875882ed45d165e30c4c73c8ba5899650
-
SHA256
d6a71e8e02344892be0895bdb46008b4e4eb08d33bf266204babf2c0bcfdf4b9
-
SHA512
97680d2396f1f5430dffea9c5d84c654237bcbe5d5eaf33294b10768f41ea6dfba685f21fe1713947c4061e7bf053e74d45b1165d27f4c58ae6c35940ba4401a
Malware Config
Extracted
raccoon
60e59be328fbd2ebac1839ea99411dccb00a6f49
-
url4cnc
http://telegin.top/agrybirdsgamerept
http://ttmirror.top/agrybirdsgamerept
http://teletele.top/agrybirdsgamerept
http://telegalive.top/agrybirdsgamerept
http://toptelete.top/agrybirdsgamerept
http://telegraf.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 688 created 3800 688 WerFault.exe d6a71e8e02344892be0895bdb46008b4e4eb08d33bf266204babf2c0bcfdf4b9.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 688 3800 WerFault.exe d6a71e8e02344892be0895bdb46008b4e4eb08d33bf266204babf2c0bcfdf4b9.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe 688 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 688 WerFault.exe Token: SeBackupPrivilege 688 WerFault.exe Token: SeDebugPrivilege 688 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6a71e8e02344892be0895bdb46008b4e4eb08d33bf266204babf2c0bcfdf4b9.exe"C:\Users\Admin\AppData\Local\Temp\d6a71e8e02344892be0895bdb46008b4e4eb08d33bf266204babf2c0bcfdf4b9.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 9962⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken