Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10_x64 -
resource
win10v191014 -
submitted
12-02-2020 19:14
Static task
static1
Behavioral task
behavioral1
Sample
348f0076f012ff2394b7c1c21dc91876.exe
Resource
win7v191014
General
-
Target
348f0076f012ff2394b7c1c21dc91876.exe
-
Size
1.4MB
-
MD5
348f0076f012ff2394b7c1c21dc91876
-
SHA1
0cf8cfde66b6e6c1cbf64e1fe0a29dc56dec961b
-
SHA256
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55
-
SHA512
37268bb8a9dc25365867819bd384239a1db5b8d35a3e3fbcc851400eb4b1e557b48adc7151d83ca0f073f814a0749a71c6dce2fc88dabbc542c24f230acff8c7
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\machineinfo.txt
raccoon
Extracted
raccoon
316ff478595e2db6ecc2380dc0039736dea133bc
http://34.76.55.103/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=1Bi_uNdZ2iSQljAb5TSljuYV1vp5edk1X
Signatures
-
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
348f0076f012ff2394b7c1c21dc91876.exepid process 4932 348f0076f012ff2394b7c1c21dc91876.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
348f0076f012ff2394b7c1c21dc91876.exedescription pid process target process PID 4932 wrote to memory of 4580 4932 348f0076f012ff2394b7c1c21dc91876.exe 348f0076f012ff2394b7c1c21dc91876.exe PID 4932 wrote to memory of 4580 4932 348f0076f012ff2394b7c1c21dc91876.exe 348f0076f012ff2394b7c1c21dc91876.exe PID 4932 wrote to memory of 4580 4932 348f0076f012ff2394b7c1c21dc91876.exe 348f0076f012ff2394b7c1c21dc91876.exe PID 4932 wrote to memory of 4580 4932 348f0076f012ff2394b7c1c21dc91876.exe 348f0076f012ff2394b7c1c21dc91876.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
348f0076f012ff2394b7c1c21dc91876.exedescription pid process target process PID 4932 set thread context of 4580 4932 348f0076f012ff2394b7c1c21dc91876.exe 348f0076f012ff2394b7c1c21dc91876.exe -
Loads dropped DLL 3 IoCs
Processes:
348f0076f012ff2394b7c1c21dc91876.exepid process 4580 348f0076f012ff2394b7c1c21dc91876.exe 4580 348f0076f012ff2394b7c1c21dc91876.exe 4580 348f0076f012ff2394b7c1c21dc91876.exe -
Reads browser user data or profiles (possible credential harvesting) 2 TTPs
-
Checks for installed software on the system 1 TTPs 27 IoCs
Processes:
348f0076f012ff2394b7c1c21dc91876.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName 348f0076f012ff2394b7c1c21dc91876.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
348f0076f012ff2394b7c1c21dc91876.exepid process 4932 348f0076f012ff2394b7c1c21dc91876.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\348f0076f012ff2394b7c1c21dc91876.exe"C:\Users\Admin\AppData\Local\Temp\348f0076f012ff2394b7c1c21dc91876.exe"1⤵
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\348f0076f012ff2394b7c1c21dc91876.exeC:\Users\Admin\AppData\Local\Temp\348f0076f012ff2394b7c1c21dc91876.exe2⤵
- Loads dropped DLL
- Checks for installed software on the system
PID:4580
-