Analysis
-
max time kernel
119s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-11-2021 09:15
Static task
static1
Behavioral task
behavioral1
Sample
b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe
Resource
win10-en-20211014
General
-
Target
b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe
-
Size
418KB
-
MD5
869df30f8e68075ef71c5fb55d0bd21f
-
SHA1
d71a9d73f2a2d12ea457d887209d8f846f1a3457
-
SHA256
b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91
-
SHA512
8236a65f8a43f5b09150ace10f736984aac02bad26c09ec6dfdd8f0f3a8f7e676186b5658b7ca8ef799e9b233f3af70482d26588caee116f97071ba9b3911081
Malware Config
Extracted
raccoon
b3ed1d79826001317754d88a62db05820a1ecd19
-
url4cnc
http://teleliver.top/agrybirdsgamerept
http://livetelive.top/agrybirdsgamerept
http://teleger.top/agrybirdsgamerept
http://telestrong.top/agrybirdsgamerept
http://tgrampro.top/agrybirdsgamerept
http://teleghost.top/agrybirdsgamerept
http://teleroom.top/agrybirdsgamerept
http://telemir.top/agrybirdsgamerept
http://teletelo.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exedescription pid process target process PID 3388 set thread context of 2972 3388 b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1324 2972 WerFault.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1324 WerFault.exe Token: SeBackupPrivilege 1324 WerFault.exe Token: SeDebugPrivilege 1324 WerFault.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exedescription pid process target process PID 3388 wrote to memory of 2972 3388 b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe PID 3388 wrote to memory of 2972 3388 b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe PID 3388 wrote to memory of 2972 3388 b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe PID 3388 wrote to memory of 2972 3388 b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe PID 3388 wrote to memory of 2972 3388 b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe PID 3388 wrote to memory of 2972 3388 b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe PID 3388 wrote to memory of 2972 3388 b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe PID 3388 wrote to memory of 2972 3388 b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe PID 3388 wrote to memory of 2972 3388 b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe"C:\Users\Admin\AppData\Local\Temp\b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe"C:\Users\Admin\AppData\Local\Temp\b8143106a1a8c782395cbd828bec11b132a4963bad60b213ba15e0e857fe5a91.exe"2⤵PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 1843⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-