Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10_x64 -
resource
win10 -
submitted
30-06-2020 13:36
Static task
static1
Behavioral task
behavioral1
Sample
cc5c3d6512bbc0e90d670e8a61481ca1.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
cc5c3d6512bbc0e90d670e8a61481ca1.exe
Resource
win10
General
-
Target
cc5c3d6512bbc0e90d670e8a61481ca1.exe
-
Size
580KB
-
MD5
cc5c3d6512bbc0e90d670e8a61481ca1
-
SHA1
cd7a8e51b413de2343aac98971d37e6363863de4
-
SHA256
bf97fab7ccc6d55f68b6563e8c68541f4b8db1cbcb841dce67663d9e4d7938b1
-
SHA512
bdc5719449433ea8a9d0066d900f843b66e4817bbe893a99a798cc57d11ad0ef23f34c6b6382c4d9fc76d140a51e5da3d1167ba60940234b927fdd2eb3270662
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cc5c3d6512bbc0e90d670e8a61481ca1.exefilingood.execmd.exedescription pid process target process PID 3260 wrote to memory of 3780 3260 cc5c3d6512bbc0e90d670e8a61481ca1.exe filingood.exe PID 3260 wrote to memory of 3780 3260 cc5c3d6512bbc0e90d670e8a61481ca1.exe filingood.exe PID 3260 wrote to memory of 3780 3260 cc5c3d6512bbc0e90d670e8a61481ca1.exe filingood.exe PID 3260 wrote to memory of 2536 3260 cc5c3d6512bbc0e90d670e8a61481ca1.exe testoviyjuki.exe PID 3260 wrote to memory of 2536 3260 cc5c3d6512bbc0e90d670e8a61481ca1.exe testoviyjuki.exe PID 3260 wrote to memory of 2536 3260 cc5c3d6512bbc0e90d670e8a61481ca1.exe testoviyjuki.exe PID 3780 wrote to memory of 1268 3780 filingood.exe cmd.exe PID 3780 wrote to memory of 1268 3780 filingood.exe cmd.exe PID 3780 wrote to memory of 1268 3780 filingood.exe cmd.exe PID 1268 wrote to memory of 1504 1268 cmd.exe timeout.exe PID 1268 wrote to memory of 1504 1268 cmd.exe timeout.exe PID 1268 wrote to memory of 1504 1268 cmd.exe timeout.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
cc5c3d6512bbc0e90d670e8a61481ca1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cc5c3d6512bbc0e90d670e8a61481ca1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cc5c3d6512bbc0e90d670e8a61481ca1.exe -
Checks for installed software on the system 1 TTPs 31 IoCs
Processes:
filingood.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName filingood.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName filingood.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName filingood.exe Key value queried \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName filingood.exe Key enumerated \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName filingood.exe Key opened \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall filingood.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName filingood.exe -
Executes dropped EXE 2 IoCs
Processes:
filingood.exetestoviyjuki.exepid process 3780 filingood.exe 2536 testoviyjuki.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2216 2536 WerFault.exe testoviyjuki.exe -
Loads dropped DLL 8 IoCs
Processes:
filingood.exepid process 3780 filingood.exe 3780 filingood.exe 3780 filingood.exe 3780 filingood.exe 3780 filingood.exe 3780 filingood.exe 3780 filingood.exe 3780 filingood.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1504 timeout.exe -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2216 created 2536 2216 WerFault.exe testoviyjuki.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2216 WerFault.exe Token: SeBackupPrivilege 2216 WerFault.exe Token: SeDebugPrivilege 2216 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe 2216 WerFault.exe -
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc5c3d6512bbc0e90d670e8a61481ca1.exe"C:\Users\Admin\AppData\Local\Temp\cc5c3d6512bbc0e90d670e8a61481ca1.exe"1⤵
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
PID:3260 -
C:\Users\Admin\AppData\Roaming\indepopede\filingood.exefilingood.exe2⤵
- Suspicious use of WriteProcessMemory
- Checks for installed software on the system
- Executes dropped EXE
- Loads dropped DLL
PID:3780 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\indepopede\filingood.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:1504
-
-
-
-
C:\Users\Admin\AppData\Roaming\indepopede\testoviyjuki.exetestoviyjuki.exe2⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 6723⤵
- Program crash
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-