Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
08-11-2021 06:50
Static task
static1
Behavioral task
behavioral1
Sample
009a4c996ff4bddb38998b59c9ca80a1464113f4155b3be415d3678e35d9c08b.exe
Resource
win10-en-20211104
General
-
Target
009a4c996ff4bddb38998b59c9ca80a1464113f4155b3be415d3678e35d9c08b.exe
-
Size
534KB
-
MD5
f2c0de1ef4f683a802afbd420d59e451
-
SHA1
947d3c0355d5a87758860053dbdf5f34d86c6b02
-
SHA256
009a4c996ff4bddb38998b59c9ca80a1464113f4155b3be415d3678e35d9c08b
-
SHA512
7cabf2d5ddc01874875567680bfede9866d7a265349172b1717aa02904537e3d87c5b4032a012a7648f5b5facbffa58aee739d46a57e45f5da53e96daf96de12
Malware Config
Extracted
raccoon
1.8.3
243f5e3056753d9f9706258dce4f79e57c3a9c44
-
url4cnc
http://178.23.190.57/agrybirdsgamerept
http://91.219.236.162/agrybirdsgamerept
http://185.163.47.176/agrybirdsgamerept
http://193.38.54.238/agrybirdsgamerept
http://74.119.192.122/agrybirdsgamerept
http://91.219.236.240/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4076 created 3664 4076 WerFault.exe 009a4c996ff4bddb38998b59c9ca80a1464113f4155b3be415d3678e35d9c08b.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4076 3664 WerFault.exe 009a4c996ff4bddb38998b59c9ca80a1464113f4155b3be415d3678e35d9c08b.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 4076 WerFault.exe Token: SeBackupPrivilege 4076 WerFault.exe Token: SeDebugPrivilege 4076 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\009a4c996ff4bddb38998b59c9ca80a1464113f4155b3be415d3678e35d9c08b.exe"C:\Users\Admin\AppData\Local\Temp\009a4c996ff4bddb38998b59c9ca80a1464113f4155b3be415d3678e35d9c08b.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 8002⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken