Analysis
-
max time kernel
119s -
max time network
136s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
28-10-2021 19:26
Static task
static1
Behavioral task
behavioral1
Sample
64771bf8e0a5d9626795cf4f1172cfaed594ce61defb10f9057fd14e83dff4c5.exe
Resource
win10-en-20210920
General
-
Target
64771bf8e0a5d9626795cf4f1172cfaed594ce61defb10f9057fd14e83dff4c5.exe
-
Size
450KB
-
MD5
cf6a0a6ec4292770c93bf9b8ada7af4b
-
SHA1
a540699e685cfa98935aff5b52a1dd9fd8ec7783
-
SHA256
64771bf8e0a5d9626795cf4f1172cfaed594ce61defb10f9057fd14e83dff4c5
-
SHA512
a72b56d0a64ca21fec21e7ab0c695d18e852d198b19c49516d32e95baa40684334bb579e2644c2727fa2a966858299dd0342d9a4ae1c8d485c73734b860af46b
Malware Config
Extracted
raccoon
60e59be328fbd2ebac1839ea99411dccb00a6f49
-
url4cnc
http://telegin.top/agrybirdsgamerept
http://ttmirror.top/agrybirdsgamerept
http://teletele.top/agrybirdsgamerept
http://telegalive.top/agrybirdsgamerept
http://toptelete.top/agrybirdsgamerept
http://telegraf.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 1548 created 2784 1548 WerFault.exe 64771bf8e0a5d9626795cf4f1172cfaed594ce61defb10f9057fd14e83dff4c5.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1548 2784 WerFault.exe 64771bf8e0a5d9626795cf4f1172cfaed594ce61defb10f9057fd14e83dff4c5.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 1548 WerFault.exe 1548 WerFault.exe 1548 WerFault.exe 1548 WerFault.exe 1548 WerFault.exe 1548 WerFault.exe 1548 WerFault.exe 1548 WerFault.exe 1548 WerFault.exe 1548 WerFault.exe 1548 WerFault.exe 1548 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1548 WerFault.exe Token: SeBackupPrivilege 1548 WerFault.exe Token: SeDebugPrivilege 1548 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64771bf8e0a5d9626795cf4f1172cfaed594ce61defb10f9057fd14e83dff4c5.exe"C:\Users\Admin\AppData\Local\Temp\64771bf8e0a5d9626795cf4f1172cfaed594ce61defb10f9057fd14e83dff4c5.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 10202⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken