Analysis

  • max time kernel
    110s
  • max time network
    116s
  • platform
    windows10_x64
  • resource
    win10v200217
  • submitted
    06-03-2020 14:56

General

  • Target

    111.exe

  • Size

    1.1MB

  • MD5

    2811be8de6af1ee6bedcc961c9001e32

  • SHA1

    535ddd8df6536df9ad9b7bb542d02c3bba3f4501

  • SHA256

    b4fb873efe46af1c642cf95c769636299db7a264dae7c6ac98043d69a13a32c2

  • SHA512

    929a852d2b7287480d22a04c59b18dc6533e7f838515c55d48f1232fb4289f3f4f0cf4144f400ae850f13cd4e81d320cd0e52fd880cb8b55a72ae19477fef1e3

Score
10/10

Malware Config

Extracted

Family

raccoon

Botnet

e4c70942470abe329d09148289e517bba5dc8de8

C2

http://34.77.125.60/gate/log.php

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1qZrnBBnNnNNwKTzUp7lRHQjySnzCdh12

rc4.plain
rc4.plain

Signatures

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 60021 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\111.exe
    "C:\Users\Admin\AppData\Local\Temp\111.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c <nul set /p ="M" > smss.com & type lsm.com >> smss.com & del lsm.com & certutil -decode bolo.com treaz & smss.com treaz & timeout 3
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3636
      • C:\Windows\SysWOW64\certutil.exe
        certutil -decode bolo.com treaz
        3⤵
          PID:992
        • C:\Users\Admin\AppData\Roaming\smss.com
          smss.com treaz
          3⤵
          • Executes dropped EXE
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          • Suspicious use of FindShellTrayWindow
          PID:3928
          • C:\Users\Admin\AppData\Roaming\smss.com
            C:\Users\Admin\AppData\Roaming\smss.com treaz
            4⤵
            • Executes dropped EXE
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            • Suspicious use of FindShellTrayWindow
            PID:3168
            • C:\Windows\SysWOW64\svchost.exe
              C:\Windows\SysWOW64\svchost.exe
              5⤵
              • Loads dropped DLL
              PID:4008
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 1640
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Program crash
                • Suspicious use of AdjustPrivilegeToken
                PID:3364
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          3⤵
          • Delays execution with timeout.exe
          PID:3884

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\bolo.com

    • C:\Users\Admin\AppData\Roaming\dKNP.com

    • C:\Users\Admin\AppData\Roaming\lsm.com

    • C:\Users\Admin\AppData\Roaming\smss.com

    • C:\Users\Admin\AppData\Roaming\smss.com

    • C:\Users\Admin\AppData\Roaming\treaz

    • \Users\Admin\AppData\LocalLow\sqlite3.dll

    • \Users\Admin\AppData\Local\Temp\nsb689E.tmp\nsExec.dll

    • memory/3364-11-0x00000000048D0000-0x00000000048D1000-memory.dmp

      Filesize

      4KB

    • memory/3364-12-0x0000000005000000-0x0000000005001000-memory.dmp

      Filesize

      4KB

    • memory/4008-7-0x0000000000180000-0x000000000020A000-memory.dmp

      Filesize

      552KB

    • memory/4008-9-0x0000000000180000-0x000000000020A000-memory.dmp

      Filesize

      552KB