Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
07-11-2021 14:14
Static task
static1
Behavioral task
behavioral1
Sample
9adfe66778bc95da83c1f0375ef57e5e9f8fcf91cb51b7ee397b7086789028d5.exe
Resource
win10-en-20211104
General
-
Target
9adfe66778bc95da83c1f0375ef57e5e9f8fcf91cb51b7ee397b7086789028d5.exe
-
Size
547KB
-
MD5
f744d2c946fc12ed561d2e22507113de
-
SHA1
0c64f31935eb539fc0fa6573c255a0c6f1a4d569
-
SHA256
9adfe66778bc95da83c1f0375ef57e5e9f8fcf91cb51b7ee397b7086789028d5
-
SHA512
edbcc1d656c7db748fd4c27a47e45660072198783b5fa7c15ae8328dfaf4ab639b7b0b5e83a08fdebc5d49113641ec14347e84c6b20a3093647e0c8604e65aab
Malware Config
Extracted
raccoon
1.8.3
243f5e3056753d9f9706258dce4f79e57c3a9c44
-
url4cnc
http://178.23.190.57/agrybirdsgamerept
http://91.219.236.162/agrybirdsgamerept
http://185.163.47.176/agrybirdsgamerept
http://193.38.54.238/agrybirdsgamerept
http://74.119.192.122/agrybirdsgamerept
http://91.219.236.240/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4224 created 2272 4224 WerFault.exe 9adfe66778bc95da83c1f0375ef57e5e9f8fcf91cb51b7ee397b7086789028d5.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4224 2272 WerFault.exe 9adfe66778bc95da83c1f0375ef57e5e9f8fcf91cb51b7ee397b7086789028d5.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 4224 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe 4224 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 4224 WerFault.exe Token: SeBackupPrivilege 4224 WerFault.exe Token: SeDebugPrivilege 4224 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9adfe66778bc95da83c1f0375ef57e5e9f8fcf91cb51b7ee397b7086789028d5.exe"C:\Users\Admin\AppData\Local\Temp\9adfe66778bc95da83c1f0375ef57e5e9f8fcf91cb51b7ee397b7086789028d5.exe"1⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 6682⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224