Analysis
-
max time kernel
120s -
max time network
124s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
92903659aa911b14052c620cd548e51b485ad4ae013fd32caa5f2a7f8f81e3b7.exe
Resource
win10-en-20211014
General
-
Target
92903659aa911b14052c620cd548e51b485ad4ae013fd32caa5f2a7f8f81e3b7.exe
-
Size
464KB
-
MD5
ecb8692f465acb8d1426d59d3d4a32a6
-
SHA1
c796965a640bdcbd8504b13819c359ad8cc6f121
-
SHA256
92903659aa911b14052c620cd548e51b485ad4ae013fd32caa5f2a7f8f81e3b7
-
SHA512
7af78f036247668760530388a173a29d7cde0c30510fd831aab7041aca4f94b0d57044d04967fd1c62c2c067b65c2752846c50aa0dfed7e20231d33215d9960b
Malware Config
Extracted
raccoon
60e59be328fbd2ebac1839ea99411dccb00a6f49
-
url4cnc
http://telegin.top/agrybirdsgamerept
http://ttmirror.top/agrybirdsgamerept
http://teletele.top/agrybirdsgamerept
http://telegalive.top/agrybirdsgamerept
http://toptelete.top/agrybirdsgamerept
http://telegraf.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3924 created 2112 3924 WerFault.exe 92903659aa911b14052c620cd548e51b485ad4ae013fd32caa5f2a7f8f81e3b7.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3924 2112 WerFault.exe 92903659aa911b14052c620cd548e51b485ad4ae013fd32caa5f2a7f8f81e3b7.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe 3924 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3924 WerFault.exe Token: SeBackupPrivilege 3924 WerFault.exe Token: SeDebugPrivilege 3924 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92903659aa911b14052c620cd548e51b485ad4ae013fd32caa5f2a7f8f81e3b7.exe"C:\Users\Admin\AppData\Local\Temp\92903659aa911b14052c620cd548e51b485ad4ae013fd32caa5f2a7f8f81e3b7.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 9322⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken