Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows10_x64 -
resource
win10 -
submitted
05-07-2020 16:05
Static task
static1
Behavioral task
behavioral1
Sample
e9114d44c80fda37201a65b3b9352782.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
e9114d44c80fda37201a65b3b9352782.exe
Resource
win10
General
-
Target
e9114d44c80fda37201a65b3b9352782.exe
-
Size
478KB
-
MD5
e9114d44c80fda37201a65b3b9352782
-
SHA1
d5cfe2cb6bcc840cfcc94e9eafa16d06e6383e89
-
SHA256
513151a50c441b16bc9e5fe8f567463fa032791f4982929fe27153df678f9582
-
SHA512
cdd7928424c8ae8ac7ed31ef879851c200ceb07b6bf093782333734a0431c9ec66cc72a787939df76a8379464f7df42e2aed2f1f5a429497991907c00edf54d9
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e9114d44c80fda37201a65b3b9352782.execmd.exedescription pid process target process PID 3544 wrote to memory of 3420 3544 e9114d44c80fda37201a65b3b9352782.exe cmd.exe PID 3544 wrote to memory of 3420 3544 e9114d44c80fda37201a65b3b9352782.exe cmd.exe PID 3544 wrote to memory of 3420 3544 e9114d44c80fda37201a65b3b9352782.exe cmd.exe PID 3420 wrote to memory of 3548 3420 cmd.exe timeout.exe PID 3420 wrote to memory of 3548 3420 cmd.exe timeout.exe PID 3420 wrote to memory of 3548 3420 cmd.exe timeout.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks for installed software on the system 1 TTPs 31 IoCs
Processes:
e9114d44c80fda37201a65b3b9352782.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key opened \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key enumerated \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName e9114d44c80fda37201a65b3b9352782.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName e9114d44c80fda37201a65b3b9352782.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3548 timeout.exe -
Loads dropped DLL 8 IoCs
Processes:
e9114d44c80fda37201a65b3b9352782.exepid process 3544 e9114d44c80fda37201a65b3b9352782.exe 3544 e9114d44c80fda37201a65b3b9352782.exe 3544 e9114d44c80fda37201a65b3b9352782.exe 3544 e9114d44c80fda37201a65b3b9352782.exe 3544 e9114d44c80fda37201a65b3b9352782.exe 3544 e9114d44c80fda37201a65b3b9352782.exe 3544 e9114d44c80fda37201a65b3b9352782.exe 3544 e9114d44c80fda37201a65b3b9352782.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9114d44c80fda37201a65b3b9352782.exe"C:\Users\Admin\AppData\Local\Temp\e9114d44c80fda37201a65b3b9352782.exe"1⤵
- Suspicious use of WriteProcessMemory
- Checks for installed software on the system
- Loads dropped DLL
PID:3544 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\e9114d44c80fda37201a65b3b9352782.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:3548
-
-