Analysis
-
max time kernel
110s -
max time network
120s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
04-01-2022 20:45
Static task
static1
Behavioral task
behavioral1
Sample
mixfive_20220104-211350.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
mixfive_20220104-211350.exe
Resource
win10-en-20211208
General
-
Target
mixfive_20220104-211350.exe
-
Size
737KB
-
MD5
0fa6313e2e4579324a00e68dacb88189
-
SHA1
f34a44e23ade24b55ab51b9141788282c2d0f827
-
SHA256
d335750b80dcfdc3d70a85bbd28a18cc6c192f0c1a880f2921d7a41b767cb49f
-
SHA512
10751a887ccbf2b9ec8aedbe7d450162e678447d4065d17ff05bf0b0feb0ba08aaba3bfad9c25d979f8cd14c4dccf6bd7f9185f2d461c7b67f70948c8e0587ce
Malware Config
Extracted
raccoon
10da56e7e71e97bdc1f36eb76813bbc3231de7e4
-
url4cnc
http://194.180.174.53/capibar
http://91.219.236.18/capibar
http://194.180.174.41/capibar
http://91.219.236.148/capibar
https://t.me/capibar
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4472 created 3404 4472 WerFault.exe mixfive_20220104-211350.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4472 3404 WerFault.exe mixfive_20220104-211350.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 4472 WerFault.exe 4472 WerFault.exe 4472 WerFault.exe 4472 WerFault.exe 4472 WerFault.exe 4472 WerFault.exe 4472 WerFault.exe 4472 WerFault.exe 4472 WerFault.exe 4472 WerFault.exe 4472 WerFault.exe 4472 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 4472 WerFault.exe Token: SeBackupPrivilege 4472 WerFault.exe Token: SeDebugPrivilege 4472 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\mixfive_20220104-211350.exe"C:\Users\Admin\AppData\Local\Temp\mixfive_20220104-211350.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 11842⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3404-115-0x0000000000BB1000-0x0000000000C25000-memory.dmpFilesize
464KB
-
memory/3404-117-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/3404-116-0x0000000000890000-0x00000000009DA000-memory.dmpFilesize
1.3MB
-
memory/3404-118-0x0000000000C2A000-0x0000000000C87000-memory.dmpFilesize
372KB
-
memory/3404-119-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/3404-120-0x00000000026C0000-0x0000000002755000-memory.dmpFilesize
596KB
-
memory/3404-121-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/3404-122-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/3404-123-0x0000000002760000-0x00000000027B0000-memory.dmpFilesize
320KB
-
memory/3404-124-0x0000000002980000-0x0000000002A12000-memory.dmpFilesize
584KB
-
memory/3404-125-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB