Analysis
-
max time kernel
110s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
03-12-2021 21:16
Static task
static1
Behavioral task
behavioral1
Sample
07521fe8947edf96c0ff0e025b0413a4efac7d2c2a4af4d6c133be25f0965cfa.exe
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
07521fe8947edf96c0ff0e025b0413a4efac7d2c2a4af4d6c133be25f0965cfa.exe
-
Size
570KB
-
MD5
c0ebe30837490a2e4a95fa7ae9d77446
-
SHA1
43c0908877efe05adfe5a99a719f12ce5c16f8ad
-
SHA256
07521fe8947edf96c0ff0e025b0413a4efac7d2c2a4af4d6c133be25f0965cfa
-
SHA512
bb7b62a577ab7525062629ed809179e102960795348c04159d6cd40d5175c73336397941fe91e1dca98cd54e188f403085ef347045b73dfd464ad6c0802c2a4e
Malware Config
Extracted
Family
raccoon
Version
1.8.3-hotfix
Botnet
049dc5184bb65eb56e4e860bf61427e2a0fcba1e
Attributes
-
url4cnc
http://185.225.19.18/duglassa1
http://91.219.237.227/duglassa1
https://t.me/duglassa1
rc4.plain
rc4.plain
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 996 created 2568 996 WerFault.exe 07521fe8947edf96c0ff0e025b0413a4efac7d2c2a4af4d6c133be25f0965cfa.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 996 2568 WerFault.exe 07521fe8947edf96c0ff0e025b0413a4efac7d2c2a4af4d6c133be25f0965cfa.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 996 WerFault.exe Token: SeBackupPrivilege 996 WerFault.exe Token: SeDebugPrivilege 996 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07521fe8947edf96c0ff0e025b0413a4efac7d2c2a4af4d6c133be25f0965cfa.exe"C:\Users\Admin\AppData\Local\Temp\07521fe8947edf96c0ff0e025b0413a4efac7d2c2a4af4d6c133be25f0965cfa.exe"1⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 9202⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996