Analysis
-
max time kernel
109s -
max time network
132s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
05-07-2020 15:59
Static task
static1
Behavioral task
behavioral1
Sample
6772bdf4c43f4c082f8af91ce7f49ff8.exe
Resource
win7
Behavioral task
behavioral2
Sample
6772bdf4c43f4c082f8af91ce7f49ff8.exe
Resource
win10v200430
General
-
Target
6772bdf4c43f4c082f8af91ce7f49ff8.exe
-
Size
477KB
-
MD5
6772bdf4c43f4c082f8af91ce7f49ff8
-
SHA1
9f58dd35dcf7638f3d78678566c08138903233a1
-
SHA256
93dee081adc816e9913b0317828d67cfff982c94506f803fe85eaa73b116283f
-
SHA512
0183844cad6cfaafe9ebcca264c898ee598602ae625c6ce70070efa782054747e024607386926795cb816a6341e4afdb4585b4230efb305d874fc2dde7fe3b9b
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Loads dropped DLL 6 IoCs
Processes:
6772bdf4c43f4c082f8af91ce7f49ff8.exepid process 2112 6772bdf4c43f4c082f8af91ce7f49ff8.exe 2112 6772bdf4c43f4c082f8af91ce7f49ff8.exe 2112 6772bdf4c43f4c082f8af91ce7f49ff8.exe 2112 6772bdf4c43f4c082f8af91ce7f49ff8.exe 2112 6772bdf4c43f4c082f8af91ce7f49ff8.exe 2112 6772bdf4c43f4c082f8af91ce7f49ff8.exe -
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6772bdf4c43f4c082f8af91ce7f49ff8.execmd.exedescription pid process target process PID 2112 wrote to memory of 3956 2112 6772bdf4c43f4c082f8af91ce7f49ff8.exe cmd.exe PID 2112 wrote to memory of 3956 2112 6772bdf4c43f4c082f8af91ce7f49ff8.exe cmd.exe PID 2112 wrote to memory of 3956 2112 6772bdf4c43f4c082f8af91ce7f49ff8.exe cmd.exe PID 3956 wrote to memory of 924 3956 cmd.exe timeout.exe PID 3956 wrote to memory of 924 3956 cmd.exe timeout.exe PID 3956 wrote to memory of 924 3956 cmd.exe timeout.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks for installed software on the system 1 TTPs 31 IoCs
Processes:
6772bdf4c43f4c082f8af91ce7f49ff8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key enumerated \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key opened \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName 6772bdf4c43f4c082f8af91ce7f49ff8.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 924 timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6772bdf4c43f4c082f8af91ce7f49ff8.exe"C:\Users\Admin\AppData\Local\Temp\6772bdf4c43f4c082f8af91ce7f49ff8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
- Checks for installed software on the system
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\6772bdf4c43f4c082f8af91ce7f49ff8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:924
-
-