Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows10_x64 -
resource
win10 -
submitted
30-06-2020 12:08
Static task
static1
Behavioral task
behavioral1
Sample
0da5863efb6a991be6b2751f67dd481f.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
0da5863efb6a991be6b2751f67dd481f.exe
Resource
win10
General
-
Target
0da5863efb6a991be6b2751f67dd481f.exe
-
Size
588KB
-
MD5
0da5863efb6a991be6b2751f67dd481f
-
SHA1
5396942eead1be7510ca4689c6c70111ab8ca7eb
-
SHA256
7e4edc8ffe28e350521029d003b74b2d77e74d4423c4ceb14fb4860341c8b95f
-
SHA512
5fe762a51307b284569e8639346e92ed0a5bac0bb8cd6b0a09b0e570d6bc3c84174ba565a756fe8c2b9f4eff2fa232e16e4505628cd2768b8bdf0210895a0f53
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Loads dropped DLL 8 IoCs
Processes:
filingood.exepid process 2964 filingood.exe 2964 filingood.exe 2964 filingood.exe 2964 filingood.exe 2964 filingood.exe 2964 filingood.exe 2964 filingood.exe 2964 filingood.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3680 3672 WerFault.exe testoviyjuki.exe -
Checks for installed software on the system 1 TTPs 31 IoCs
Processes:
filingood.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName filingood.exe Key opened \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall filingood.exe Key enumerated \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName filingood.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName filingood.exe Key value queried \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName filingood.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName filingood.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4048 timeout.exe -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3680 created 3672 3680 WerFault.exe testoviyjuki.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0da5863efb6a991be6b2751f67dd481f.exefilingood.execmd.exedescription pid process target process PID 3844 wrote to memory of 2964 3844 0da5863efb6a991be6b2751f67dd481f.exe filingood.exe PID 3844 wrote to memory of 2964 3844 0da5863efb6a991be6b2751f67dd481f.exe filingood.exe PID 3844 wrote to memory of 2964 3844 0da5863efb6a991be6b2751f67dd481f.exe filingood.exe PID 3844 wrote to memory of 3672 3844 0da5863efb6a991be6b2751f67dd481f.exe testoviyjuki.exe PID 3844 wrote to memory of 3672 3844 0da5863efb6a991be6b2751f67dd481f.exe testoviyjuki.exe PID 3844 wrote to memory of 3672 3844 0da5863efb6a991be6b2751f67dd481f.exe testoviyjuki.exe PID 2964 wrote to memory of 3376 2964 filingood.exe cmd.exe PID 2964 wrote to memory of 3376 2964 filingood.exe cmd.exe PID 2964 wrote to memory of 3376 2964 filingood.exe cmd.exe PID 3376 wrote to memory of 4048 3376 cmd.exe timeout.exe PID 3376 wrote to memory of 4048 3376 cmd.exe timeout.exe PID 3376 wrote to memory of 4048 3376 cmd.exe timeout.exe -
Executes dropped EXE 2 IoCs
Processes:
filingood.exetestoviyjuki.exepid process 2964 filingood.exe 3672 testoviyjuki.exe -
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3680 WerFault.exe Token: SeBackupPrivilege 3680 WerFault.exe Token: SeDebugPrivilege 3680 WerFault.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
0da5863efb6a991be6b2751f67dd481f.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0da5863efb6a991be6b2751f67dd481f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0da5863efb6a991be6b2751f67dd481f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
Processes
-
C:\Users\Admin\AppData\Local\Temp\0da5863efb6a991be6b2751f67dd481f.exe"C:\Users\Admin\AppData\Local\Temp\0da5863efb6a991be6b2751f67dd481f.exe"1⤵
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
PID:3844 -
C:\Users\Admin\AppData\Roaming\indepopede\filingood.exefilingood.exe2⤵
- Loads dropped DLL
- Checks for installed software on the system
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\indepopede\filingood.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:4048
-
-
-
-
C:\Users\Admin\AppData\Roaming\indepopede\testoviyjuki.exetestoviyjuki.exe2⤵
- Executes dropped EXE
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 6763⤵
- Program crash
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-