Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
08-11-2021 11:49
Static task
static1
Behavioral task
behavioral1
Sample
0f2db91b5b581e397e793cbfa45436ea0a13a4cb9aa734cb820208f8bf9a51af.exe
Resource
win10-en-20211104
General
-
Target
0f2db91b5b581e397e793cbfa45436ea0a13a4cb9aa734cb820208f8bf9a51af.exe
-
Size
534KB
-
MD5
887192b1fd38962b73f3fb1d0d765d71
-
SHA1
1ca5d77915290794f73bb521a0ff0734bffcdce5
-
SHA256
0f2db91b5b581e397e793cbfa45436ea0a13a4cb9aa734cb820208f8bf9a51af
-
SHA512
ad7b15f3ca8444a5b0b7698fca948af9dabbc3c9885dbbba32aafb3db33c0a782a63d636d6df9f3d8b41579aa5e64a58b16fb42ecec81a3da9b4cc117d18eab2
Malware Config
Extracted
raccoon
1.8.3
243f5e3056753d9f9706258dce4f79e57c3a9c44
-
url4cnc
http://178.23.190.57/agrybirdsgamerept
http://91.219.236.162/agrybirdsgamerept
http://185.163.47.176/agrybirdsgamerept
http://193.38.54.238/agrybirdsgamerept
http://74.119.192.122/agrybirdsgamerept
http://91.219.236.240/agrybirdsgamerept
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3080 created 1012 3080 WerFault.exe 0f2db91b5b581e397e793cbfa45436ea0a13a4cb9aa734cb820208f8bf9a51af.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3080 1012 WerFault.exe 0f2db91b5b581e397e793cbfa45436ea0a13a4cb9aa734cb820208f8bf9a51af.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe 3080 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3080 WerFault.exe Token: SeBackupPrivilege 3080 WerFault.exe Token: SeDebugPrivilege 3080 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f2db91b5b581e397e793cbfa45436ea0a13a4cb9aa734cb820208f8bf9a51af.exe"C:\Users\Admin\AppData\Local\Temp\0f2db91b5b581e397e793cbfa45436ea0a13a4cb9aa734cb820208f8bf9a51af.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 8362⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken