Analysis
-
max time kernel
74s -
max time network
137s -
platform
windows10_x64 -
resource
win10 -
submitted
05-07-2020 17:09
Static task
static1
Behavioral task
behavioral1
Sample
ca377ec6126ac459d77abd0a007b6a27.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
ca377ec6126ac459d77abd0a007b6a27.exe
Resource
win10
General
-
Target
ca377ec6126ac459d77abd0a007b6a27.exe
-
Size
486KB
-
MD5
ca377ec6126ac459d77abd0a007b6a27
-
SHA1
6cba52673af7df53d60852e96000f565d9fe2ede
-
SHA256
ad60a3f212003066341aee73c92b642a5a62933fd0dbabb813ce185fcf458222
-
SHA512
1729d37c12f4cb670a6ea456bead0bb6d42a42882b2da622b71600786f69dc189d71db9976bd977a8dedc459fc70607ebfada689430c203d9eb12d36ef9a56e9
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ca377ec6126ac459d77abd0a007b6a27.execmd.exedescription pid process target process PID 3676 wrote to memory of 3220 3676 ca377ec6126ac459d77abd0a007b6a27.exe cmd.exe PID 3676 wrote to memory of 3220 3676 ca377ec6126ac459d77abd0a007b6a27.exe cmd.exe PID 3676 wrote to memory of 3220 3676 ca377ec6126ac459d77abd0a007b6a27.exe cmd.exe PID 3220 wrote to memory of 1664 3220 cmd.exe timeout.exe PID 3220 wrote to memory of 1664 3220 cmd.exe timeout.exe PID 3220 wrote to memory of 1664 3220 cmd.exe timeout.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks for installed software on the system 1 TTPs 31 IoCs
Processes:
ca377ec6126ac459d77abd0a007b6a27.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key enumerated \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key opened \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall ca377ec6126ac459d77abd0a007b6a27.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall ca377ec6126ac459d77abd0a007b6a27.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName ca377ec6126ac459d77abd0a007b6a27.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1664 timeout.exe -
Loads dropped DLL 8 IoCs
Processes:
ca377ec6126ac459d77abd0a007b6a27.exepid process 3676 ca377ec6126ac459d77abd0a007b6a27.exe 3676 ca377ec6126ac459d77abd0a007b6a27.exe 3676 ca377ec6126ac459d77abd0a007b6a27.exe 3676 ca377ec6126ac459d77abd0a007b6a27.exe 3676 ca377ec6126ac459d77abd0a007b6a27.exe 3676 ca377ec6126ac459d77abd0a007b6a27.exe 3676 ca377ec6126ac459d77abd0a007b6a27.exe 3676 ca377ec6126ac459d77abd0a007b6a27.exe -
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca377ec6126ac459d77abd0a007b6a27.exe"C:\Users\Admin\AppData\Local\Temp\ca377ec6126ac459d77abd0a007b6a27.exe"1⤵
- Suspicious use of WriteProcessMemory
- Checks for installed software on the system
- Loads dropped DLL
PID:3676 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\ca377ec6126ac459d77abd0a007b6a27.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1664