Analysis
-
max time kernel
143s -
max time network
136s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
18-02-2020 15:20
Static task
static1
Behavioral task
behavioral1
Sample
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe
Resource
win7v200217
General
-
Target
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe
-
Size
1.4MB
-
MD5
348f0076f012ff2394b7c1c21dc91876
-
SHA1
0cf8cfde66b6e6c1cbf64e1fe0a29dc56dec961b
-
SHA256
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55
-
SHA512
37268bb8a9dc25365867819bd384239a1db5b8d35a3e3fbcc851400eb4b1e557b48adc7151d83ca0f073f814a0749a71c6dce2fc88dabbc542c24f230acff8c7
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\machineinfo.txt
raccoon
Extracted
raccoon
316ff478595e2db6ecc2380dc0039736dea133bc
http://34.76.55.103/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=1Bi_uNdZ2iSQljAb5TSljuYV1vp5edk1X
Signatures
-
Checks for installed software on the system 1 TTPs 27 IoCs
Processes:
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exepid process 4044 b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exepid process 4044 b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exedescription pid process target process PID 4044 wrote to memory of 3720 4044 b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe PID 4044 wrote to memory of 3720 4044 b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe PID 4044 wrote to memory of 3720 4044 b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe PID 4044 wrote to memory of 3720 4044 b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exedescription pid process target process PID 4044 set thread context of 3720 4044 b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe -
Loads dropped DLL 3 IoCs
Processes:
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exepid process 3720 b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe 3720 b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe 3720 b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe -
Reads browser user data or profiles (possible credential harvesting) 2 TTPs
Processes
-
C:\Users\Admin\AppData\Local\Temp\b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe"C:\Users\Admin\AppData\Local\Temp\b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exeC:\Users\Admin\AppData\Local\Temp\b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe2⤵
- Checks for installed software on the system
- Loads dropped DLL
PID:3720
-