Analysis
-
max time kernel
84s -
max time network
86s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
05-08-2020 14:04
Static task
static1
Behavioral task
behavioral1
Sample
b3e305749702aa6388df210722c0708c.exe
Resource
win7
Behavioral task
behavioral2
Sample
b3e305749702aa6388df210722c0708c.exe
Resource
win10v200722
General
-
Target
b3e305749702aa6388df210722c0708c.exe
-
Size
1.3MB
-
MD5
b3e305749702aa6388df210722c0708c
-
SHA1
41ceebf04b6d71d2e5e7a7a984cccf9b0f45489b
-
SHA256
663a1c4ee49a409991a7de757a66929c9682fa58640c8eb3af9023fcec2c72d7
-
SHA512
0fedf43a691149282924953f217a438a409e58167ca7d94994c6102bbd3bee9f28d6741f8db0b219c837beed37f8aeb2fe6dadd38f7b8334a94cf1d932587378
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b3e305749702aa6388df210722c0708c.execmd.exedescription pid process target process PID 3740 wrote to memory of 396 3740 b3e305749702aa6388df210722c0708c.exe cmd.exe PID 3740 wrote to memory of 396 3740 b3e305749702aa6388df210722c0708c.exe cmd.exe PID 3740 wrote to memory of 396 3740 b3e305749702aa6388df210722c0708c.exe cmd.exe PID 396 wrote to memory of 1116 396 cmd.exe timeout.exe PID 396 wrote to memory of 1116 396 cmd.exe timeout.exe PID 396 wrote to memory of 1116 396 cmd.exe timeout.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Loads dropped DLL 6 IoCs
Processes:
b3e305749702aa6388df210722c0708c.exepid process 3740 b3e305749702aa6388df210722c0708c.exe 3740 b3e305749702aa6388df210722c0708c.exe 3740 b3e305749702aa6388df210722c0708c.exe 3740 b3e305749702aa6388df210722c0708c.exe 3740 b3e305749702aa6388df210722c0708c.exe 3740 b3e305749702aa6388df210722c0708c.exe -
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
JavaScript code in executable 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\LocalLow\3098htrhpen8ifg0\nss3.dll js -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1116 timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3e305749702aa6388df210722c0708c.exe"C:\Users\Admin\AppData\Local\Temp\b3e305749702aa6388df210722c0708c.exe"1⤵
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
PID:3740 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\b3e305749702aa6388df210722c0708c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1116