Analysis
-
max time kernel
78s -
max time network
112s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
08-09-2020 07:43
Static task
static1
Behavioral task
behavioral1
Sample
9f34d4f248f8f1ff7c8f683f5c97ee7d.exe
Resource
win7
Behavioral task
behavioral2
Sample
9f34d4f248f8f1ff7c8f683f5c97ee7d.exe
Resource
win10v200722
General
-
Target
9f34d4f248f8f1ff7c8f683f5c97ee7d.exe
-
Size
684KB
-
MD5
9f34d4f248f8f1ff7c8f683f5c97ee7d
-
SHA1
0a982af57e5be5dcc06a4d680072a9ae52dcfaae
-
SHA256
9c2978d525c68cceb114ea784ca6a6975dfee9ea7f2ac6aaebeb209a915524cb
-
SHA512
3c39107f7ab6fdf8c3b9b248a715cc8add69c0c8f0d0f802f0fc4ab86a09ff62f0aed79de867c64bbdb643cd4953669266cc78e56fbf0ec54e04d92acb2df451
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Loads dropped DLL 6 IoCs
Processes:
9f34d4f248f8f1ff7c8f683f5c97ee7d.exepid process 3840 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 3840 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 3840 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 3840 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 3840 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 3840 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\LocalLow\3098htrhpen8ifg0\nss3.dll js -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9f34d4f248f8f1ff7c8f683f5c97ee7d.exedescription pid process target process PID 408 set thread context of 3840 408 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3172 timeout.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = 2b0318f7c485d601 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 2552 svchost.exe Token: SeCreatePagefilePrivilege 2552 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
9f34d4f248f8f1ff7c8f683f5c97ee7d.exe9f34d4f248f8f1ff7c8f683f5c97ee7d.execmd.exedescription pid process target process PID 408 wrote to memory of 3840 408 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe PID 408 wrote to memory of 3840 408 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe PID 408 wrote to memory of 3840 408 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe PID 408 wrote to memory of 3840 408 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe PID 408 wrote to memory of 3840 408 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe PID 3840 wrote to memory of 2620 3840 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe cmd.exe PID 3840 wrote to memory of 2620 3840 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe cmd.exe PID 3840 wrote to memory of 2620 3840 9f34d4f248f8f1ff7c8f683f5c97ee7d.exe cmd.exe PID 2620 wrote to memory of 3172 2620 cmd.exe timeout.exe PID 2620 wrote to memory of 3172 2620 cmd.exe timeout.exe PID 2620 wrote to memory of 3172 2620 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f34d4f248f8f1ff7c8f683f5c97ee7d.exe"C:\Users\Admin\AppData\Local\Temp\9f34d4f248f8f1ff7c8f683f5c97ee7d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\9f34d4f248f8f1ff7c8f683f5c97ee7d.exe"C:\Users\Admin\AppData\Local\Temp\9f34d4f248f8f1ff7c8f683f5c97ee7d.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\9f34d4f248f8f1ff7c8f683f5c97ee7d.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:3172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2552