Analysis
-
max time kernel
61s -
max time network
45s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
10-07-2020 05:10
Static task
static1
Behavioral task
behavioral1
Sample
9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe
Resource
win10
General
-
Target
9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe
-
Size
1.0MB
-
MD5
9a31a01f8e6fd171bc5e6bcdba4ef0c4
-
SHA1
6bac9e69835450235fa6ff9580f3c35a46df526b
-
SHA256
2474c1ce1d299fd2234e7b10f6e464861151bf53e68f15a2a944dbeb56e5e0e9
-
SHA512
d162b78512cb5890fdb42c7ae595c10fe37e362d733d1d9f114a1fae6aeec89fcfd3458dbc2d879c48710d04134a877d7bfea01b031a79e0b528a9d1157aa71a
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Loads dropped DLL 8 IoCs
Processes:
9a31a01f8e6fd171bc5e6bcdba4ef0c4.exepid process 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9a31a01f8e6fd171bc5e6bcdba4ef0c4.exedescription pid process target process PID 1412 set thread context of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe -
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 268 cmd.exe -
Checks for installed software on the system 1 TTPs 30 IoCs
Processes:
9a31a01f8e6fd171bc5e6bcdba4ef0c4.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-A90000000001}\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{92FB6C44-E685-45AD-9B20-CADF4CABA132}.KB4087364\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key opened \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BB8B979E-E336-47E7-96BC-1031C1B94561}\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1068 timeout.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe9a31a01f8e6fd171bc5e6bcdba4ef0c4.execmd.exedescription pid process target process PID 1412 wrote to memory of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe PID 1412 wrote to memory of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe PID 1412 wrote to memory of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe PID 1412 wrote to memory of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe PID 1412 wrote to memory of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe PID 1412 wrote to memory of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe PID 1412 wrote to memory of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe PID 1412 wrote to memory of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe PID 1412 wrote to memory of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe PID 1412 wrote to memory of 1028 1412 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe PID 1028 wrote to memory of 268 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe cmd.exe PID 1028 wrote to memory of 268 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe cmd.exe PID 1028 wrote to memory of 268 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe cmd.exe PID 1028 wrote to memory of 268 1028 9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe cmd.exe PID 268 wrote to memory of 1068 268 cmd.exe timeout.exe PID 268 wrote to memory of 1068 268 cmd.exe timeout.exe PID 268 wrote to memory of 1068 268 cmd.exe timeout.exe PID 268 wrote to memory of 1068 268 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe"C:\Users\Admin\AppData\Local\Temp\9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe"{path}"2⤵
- Loads dropped DLL
- Checks for installed software on the system
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\9a31a01f8e6fd171bc5e6bcdba4ef0c4.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:1068
-
-
-