Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows10_x64 -
resource
win10 -
submitted
05-07-2020 08:50
Static task
static1
Behavioral task
behavioral1
Sample
c6bbbdefc98a512feec84b91da2f23c9.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
c6bbbdefc98a512feec84b91da2f23c9.exe
Resource
win10
General
-
Target
c6bbbdefc98a512feec84b91da2f23c9.exe
-
Size
479KB
-
MD5
c6bbbdefc98a512feec84b91da2f23c9
-
SHA1
955201f53fd062cc5f42d39072d53b3f5e5cde7d
-
SHA256
29da47cddcf24e4198ad634829b6b16715a51bcb346c729926dcf64e324db1a1
-
SHA512
bdc6a29b219e0ab79fe365fc5469483c0b21f0cdff74d33e6ec0685d8e4575538577cb634a4300719bba9f072a1049f421b0fab1aaf092d34994ae12676a8336
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks for installed software on the system 1 TTPs 31 IoCs
Processes:
c6bbbdefc98a512feec84b91da2f23c9.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key opened \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall c6bbbdefc98a512feec84b91da2f23c9.exe Key enumerated \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName c6bbbdefc98a512feec84b91da2f23c9.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2556 timeout.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Loads dropped DLL 8 IoCs
Processes:
c6bbbdefc98a512feec84b91da2f23c9.exepid process 976 c6bbbdefc98a512feec84b91da2f23c9.exe 976 c6bbbdefc98a512feec84b91da2f23c9.exe 976 c6bbbdefc98a512feec84b91da2f23c9.exe 976 c6bbbdefc98a512feec84b91da2f23c9.exe 976 c6bbbdefc98a512feec84b91da2f23c9.exe 976 c6bbbdefc98a512feec84b91da2f23c9.exe 976 c6bbbdefc98a512feec84b91da2f23c9.exe 976 c6bbbdefc98a512feec84b91da2f23c9.exe -
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c6bbbdefc98a512feec84b91da2f23c9.execmd.exedescription pid process target process PID 976 wrote to memory of 4036 976 c6bbbdefc98a512feec84b91da2f23c9.exe cmd.exe PID 976 wrote to memory of 4036 976 c6bbbdefc98a512feec84b91da2f23c9.exe cmd.exe PID 976 wrote to memory of 4036 976 c6bbbdefc98a512feec84b91da2f23c9.exe cmd.exe PID 4036 wrote to memory of 2556 4036 cmd.exe timeout.exe PID 4036 wrote to memory of 2556 4036 cmd.exe timeout.exe PID 4036 wrote to memory of 2556 4036 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6bbbdefc98a512feec84b91da2f23c9.exe"C:\Users\Admin\AppData\Local\Temp\c6bbbdefc98a512feec84b91da2f23c9.exe"1⤵
- Checks for installed software on the system
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\c6bbbdefc98a512feec84b91da2f23c9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2556
-
-