Analysis
-
max time kernel
104s -
max time network
106s -
platform
windows10_x64 -
resource
win10v200410 -
submitted
15-04-2020 14:53
Static task
static1
Behavioral task
behavioral1
Sample
host.bin.exe
Resource
win7v200410
General
-
Target
host.bin.exe
-
Size
496KB
-
MD5
e4f4e051625054d753730fd9183c4a34
-
SHA1
d538ffffd82540752a23d5defc90e501093861bf
-
SHA256
43eb644d0682f9bc85745c538015ba9ad19b10116792b5e5aa5da33b6c3af797
-
SHA512
10178975c49c2fc1c414ad1d106d1e46c0fa4bd1748bba24c80b7ff982da034019d69bba3b559255632a8df953dab7ec901b979d8be99ee88efefb3cbd9861a5
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
raccoon
ff236091d9fbac249beeec4137efd72b5327efd9
http://35.240.36.208/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=12JPrOMXQIwvLmvbb60igt1JLe1WETE6M
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
host.bin.exepid process 296 host.bin.exe 296 host.bin.exe -
Loads dropped DLL 3 IoCs
Processes:
host.bin.exepid process 296 host.bin.exe 296 host.bin.exe 296 host.bin.exe -
Checks for installed software on the system 1 TTPs 30 IoCs
Processes:
host.bin.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName host.bin.exe Key value queried \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName host.bin.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName host.bin.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName host.bin.exe Key enumerated \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName host.bin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName host.bin.exe Key opened \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall host.bin.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3940 timeout.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
host.bin.exepid process 3996 host.bin.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
host.bin.exehost.bin.execmd.exedescription pid process target process PID 3996 wrote to memory of 296 3996 host.bin.exe host.bin.exe PID 3996 wrote to memory of 296 3996 host.bin.exe host.bin.exe PID 3996 wrote to memory of 296 3996 host.bin.exe host.bin.exe PID 3996 wrote to memory of 296 3996 host.bin.exe host.bin.exe PID 296 wrote to memory of 4004 296 host.bin.exe cmd.exe PID 296 wrote to memory of 4004 296 host.bin.exe cmd.exe PID 296 wrote to memory of 4004 296 host.bin.exe cmd.exe PID 4004 wrote to memory of 3940 4004 cmd.exe timeout.exe PID 4004 wrote to memory of 3940 4004 cmd.exe timeout.exe PID 4004 wrote to memory of 3940 4004 cmd.exe timeout.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
host.bin.exepid process 3996 host.bin.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
host.bin.exedescription pid process target process PID 3996 set thread context of 296 3996 host.bin.exe host.bin.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
Processes
-
C:\Users\Admin\AppData\Local\Temp\host.bin.exe"C:\Users\Admin\AppData\Local\Temp\host.bin.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\host.bin.exe"C:\Users\Admin\AppData\Local\Temp\host.bin.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Loads dropped DLL
- Checks for installed software on the system
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\host.bin.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:3940
-
-
-