Analysis
-
max time kernel
121s -
max time network
136s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
87baaaf5c4e9de6300ca70fa7d1c0ea338435e64f168cad2c21702e4860424fa.exe
Resource
win10-en-20210920
General
-
Target
87baaaf5c4e9de6300ca70fa7d1c0ea338435e64f168cad2c21702e4860424fa.exe
-
Size
589KB
-
MD5
5e6f5e7a8a4472211fc896b0bf1394f4
-
SHA1
865cab77570e3a6ba7394924daf7bec22c3b07db
-
SHA256
87baaaf5c4e9de6300ca70fa7d1c0ea338435e64f168cad2c21702e4860424fa
-
SHA512
b70781e24e85a20d7f26cb10bff49d5967c083037fd80cde1724adb66556f90a7b5f5d1396842ff4d7557f6280d06e9f4f208bbc98a3bf00d4a311f454b0fb78
Malware Config
Extracted
raccoon
60e59be328fbd2ebac1839ea99411dccb00a6f49
-
url4cnc
http://telegin.top/agrybirdsgamerept
http://ttmirror.top/agrybirdsgamerept
http://teletele.top/agrybirdsgamerept
http://telegalive.top/agrybirdsgamerept
http://toptelete.top/agrybirdsgamerept
http://telegraf.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3276 created 3692 3276 WerFault.exe 87baaaf5c4e9de6300ca70fa7d1c0ea338435e64f168cad2c21702e4860424fa.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3276 3692 WerFault.exe 87baaaf5c4e9de6300ca70fa7d1c0ea338435e64f168cad2c21702e4860424fa.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe 3276 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3276 WerFault.exe Token: SeBackupPrivilege 3276 WerFault.exe Token: SeDebugPrivilege 3276 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87baaaf5c4e9de6300ca70fa7d1c0ea338435e64f168cad2c21702e4860424fa.exe"C:\Users\Admin\AppData\Local\Temp\87baaaf5c4e9de6300ca70fa7d1c0ea338435e64f168cad2c21702e4860424fa.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 9002⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken