Analysis
-
max time kernel
109s -
max time network
131s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
25-06-2020 17:12
Static task
static1
Behavioral task
behavioral1
Sample
966b20a7237a77a80f7a9192315f7702.exe
Resource
win7
Behavioral task
behavioral2
Sample
966b20a7237a77a80f7a9192315f7702.exe
Resource
win10v200430
General
-
Target
966b20a7237a77a80f7a9192315f7702.exe
-
Size
512KB
-
MD5
966b20a7237a77a80f7a9192315f7702
-
SHA1
f3aa6f976f620fd8be15a53612638b5e66e27b35
-
SHA256
356c60f9b2cfb563dc067db5971545eb5a414ab55bba68812adce17d7fe6d938
-
SHA512
d4bb740578c448771ea085127f6713c78537876f6fb5855cd11334a00ae1c3b59fc974f99b3b5a3d31cfe1750ff6737646ffcd6853a6be05eb7879f1a4750ef7
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1068 timeout.exe -
Loads dropped DLL 6 IoCs
Processes:
966b20a7237a77a80f7a9192315f7702.exepid process 2116 966b20a7237a77a80f7a9192315f7702.exe 2116 966b20a7237a77a80f7a9192315f7702.exe 2116 966b20a7237a77a80f7a9192315f7702.exe 2116 966b20a7237a77a80f7a9192315f7702.exe 2116 966b20a7237a77a80f7a9192315f7702.exe 2116 966b20a7237a77a80f7a9192315f7702.exe -
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
966b20a7237a77a80f7a9192315f7702.execmd.exedescription pid process target process PID 2116 wrote to memory of 2916 2116 966b20a7237a77a80f7a9192315f7702.exe cmd.exe PID 2116 wrote to memory of 2916 2116 966b20a7237a77a80f7a9192315f7702.exe cmd.exe PID 2116 wrote to memory of 2916 2116 966b20a7237a77a80f7a9192315f7702.exe cmd.exe PID 2916 wrote to memory of 1068 2916 cmd.exe timeout.exe PID 2916 wrote to memory of 1068 2916 cmd.exe timeout.exe PID 2916 wrote to memory of 1068 2916 cmd.exe timeout.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks for installed software on the system 1 TTPs 31 IoCs
Processes:
966b20a7237a77a80f7a9192315f7702.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key enumerated \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key opened \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName 966b20a7237a77a80f7a9192315f7702.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName 966b20a7237a77a80f7a9192315f7702.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\966b20a7237a77a80f7a9192315f7702.exe"C:\Users\Admin\AppData\Local\Temp\966b20a7237a77a80f7a9192315f7702.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
- Checks for installed software on the system
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\966b20a7237a77a80f7a9192315f7702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1068
-
-