Analysis
-
max time kernel
98s -
max time network
101s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
25-07-2020 07:58
Static task
static1
Behavioral task
behavioral1
Sample
f672dfe76306a3ac9374995a41b970cf.exe
Resource
win7
Behavioral task
behavioral2
Sample
f672dfe76306a3ac9374995a41b970cf.exe
Resource
win10v200722
General
-
Target
f672dfe76306a3ac9374995a41b970cf.exe
-
Size
1.2MB
-
MD5
f672dfe76306a3ac9374995a41b970cf
-
SHA1
a8ea9001e256877170fe020c2ee4526c37420f3a
-
SHA256
df8d54f6cc81963438d367d0a15ee70534e6295b70474763782aaac2d7cfee0c
-
SHA512
0019d9b9ef45e03c48b1e608e4710d6049d749703012a95b20e955bd9c59a4d8002974ca7bc04e9b872f4605c267f5ed4a0afad781642624226639b664ed2d7d
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\LocalLow\3098htrhpen8ifg0\nss3.dll js -
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f672dfe76306a3ac9374995a41b970cf.execmd.exedescription pid process target process PID 3816 wrote to memory of 808 3816 f672dfe76306a3ac9374995a41b970cf.exe cmd.exe PID 3816 wrote to memory of 808 3816 f672dfe76306a3ac9374995a41b970cf.exe cmd.exe PID 3816 wrote to memory of 808 3816 f672dfe76306a3ac9374995a41b970cf.exe cmd.exe PID 808 wrote to memory of 1016 808 cmd.exe timeout.exe PID 808 wrote to memory of 1016 808 cmd.exe timeout.exe PID 808 wrote to memory of 1016 808 cmd.exe timeout.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1016 timeout.exe -
Loads dropped DLL 6 IoCs
Processes:
f672dfe76306a3ac9374995a41b970cf.exepid process 3816 f672dfe76306a3ac9374995a41b970cf.exe 3816 f672dfe76306a3ac9374995a41b970cf.exe 3816 f672dfe76306a3ac9374995a41b970cf.exe 3816 f672dfe76306a3ac9374995a41b970cf.exe 3816 f672dfe76306a3ac9374995a41b970cf.exe 3816 f672dfe76306a3ac9374995a41b970cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f672dfe76306a3ac9374995a41b970cf.exe"C:\Users\Admin\AppData\Local\Temp\f672dfe76306a3ac9374995a41b970cf.exe"1⤵
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
PID:3816 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\f672dfe76306a3ac9374995a41b970cf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1016