Analysis
-
max time kernel
75s -
max time network
148s -
platform
windows10_x64 -
resource
win10 -
submitted
05-07-2020 07:03
Static task
static1
Behavioral task
behavioral1
Sample
ba5247cd640bdacfdefda132c30a9f47.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
ba5247cd640bdacfdefda132c30a9f47.exe
Resource
win10
General
-
Target
ba5247cd640bdacfdefda132c30a9f47.exe
-
Size
479KB
-
MD5
ba5247cd640bdacfdefda132c30a9f47
-
SHA1
bcfd6290bdfcf831c5b6685f767229e53f53af42
-
SHA256
23a0252821a8c77330b6a22e678ad1bf5dca05a6e2e48e301ae87e331a0cadcf
-
SHA512
70c208d9813c7c5521510cc7deb3076fcba97ad6afbad841d06e0f362a0c4cc886c0cf543777a8361720073e68c3dabc2d3fa59ccaa48743f6abc348743814d2
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Loads dropped DLL 8 IoCs
Processes:
ba5247cd640bdacfdefda132c30a9f47.exepid process 2880 ba5247cd640bdacfdefda132c30a9f47.exe 2880 ba5247cd640bdacfdefda132c30a9f47.exe 2880 ba5247cd640bdacfdefda132c30a9f47.exe 2880 ba5247cd640bdacfdefda132c30a9f47.exe 2880 ba5247cd640bdacfdefda132c30a9f47.exe 2880 ba5247cd640bdacfdefda132c30a9f47.exe 2880 ba5247cd640bdacfdefda132c30a9f47.exe 2880 ba5247cd640bdacfdefda132c30a9f47.exe -
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ba5247cd640bdacfdefda132c30a9f47.execmd.exedescription pid process target process PID 2880 wrote to memory of 3516 2880 ba5247cd640bdacfdefda132c30a9f47.exe cmd.exe PID 2880 wrote to memory of 3516 2880 ba5247cd640bdacfdefda132c30a9f47.exe cmd.exe PID 2880 wrote to memory of 3516 2880 ba5247cd640bdacfdefda132c30a9f47.exe cmd.exe PID 3516 wrote to memory of 980 3516 cmd.exe timeout.exe PID 3516 wrote to memory of 980 3516 cmd.exe timeout.exe PID 3516 wrote to memory of 980 3516 cmd.exe timeout.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks for installed software on the system 1 TTPs 31 IoCs
Processes:
ba5247cd640bdacfdefda132c30a9f47.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key opened \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key enumerated \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName ba5247cd640bdacfdefda132c30a9f47.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 980 timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba5247cd640bdacfdefda132c30a9f47.exe"C:\Users\Admin\AppData\Local\Temp\ba5247cd640bdacfdefda132c30a9f47.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
- Checks for installed software on the system
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\ba5247cd640bdacfdefda132c30a9f47.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:980
-
-