Analysis
-
max time kernel
99s -
max time network
138s -
platform
windows10_x64 -
resource
win10 -
submitted
23-10-2020 23:37
Static task
static1
Behavioral task
behavioral1
Sample
system32.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
system32.bin.exe
Resource
win10
General
-
Target
system32.bin.exe
-
Size
465KB
-
MD5
049ef18418affcd542d9aa545bb07ee3
-
SHA1
994b2b316ed112d81c697294405dcf15f9193deb
-
SHA256
4d056b87049ec7fce672b40190bf8b5f9185395b7313d05bc196a655e7fe0c7a
-
SHA512
ad0b3ab61327d0cc802d3512db80a60be264a52b8f0f750c9d83b4750d1373c59466d399da8650523d6e99723d75e962176ece9f669310f464844c5c2370886c
Malware Config
Extracted
raccoon
- url4cnc
Extracted
raccoon
b240f186dfcd9a0141345e239b4ac51800830ac0
-
url4cnc
https://drive.google.com/uc?export=download&id=19HMmBPaIPyhdlvzB7YPOENIFHwLz8Kkc
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 1640 created 1756 1640 WerFault.exe cmd.exe -
ServiceHost packer 8 IoCs
Detects ServiceHost packer used for .NET malware
Processes:
resource yara_rule behavioral2/memory/1756-19-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1756-20-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1756-22-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1756-21-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1756-23-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1756-24-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1756-25-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/1756-26-0x0000000000000000-mapping.dmp servicehost -
Blacklisted process makes network request 1 IoCs
Processes:
cmd.exeflow pid process 18 1756 cmd.exe -
Drops startup file 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.lnk cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.lnk cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
system32.bin.exepid process 3900 system32.bin.exe 3900 system32.bin.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Modifies service 2 TTPs 1 IoCs
Processes:
system32.bin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\TcpWindowSize = "64240" system32.bin.exe -
Drops file in Windows directory 2 IoCs
Processes:
cmd.exesystem32.bin.exedescription ioc process File created C:\Windows\Tasks\System32.job cmd.exe File opened for modification C:\Windows\win.ini system32.bin.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1640 1756 WerFault.exe cmd.exe -
Modifies registry class 2 IoCs
Processes:
system32.bin.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AudioCD\shell\PlayWithVLC\command system32.bin.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AudioCD\shell\PlayWithVLC system32.bin.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
system32.bin.exepowershell.exeWerFault.exepid process 3900 system32.bin.exe 3840 powershell.exe 3840 powershell.exe 3840 powershell.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
system32.bin.exepid process 3900 system32.bin.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
powershell.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3840 powershell.exe Token: SeRestorePrivilege 1640 WerFault.exe Token: SeBackupPrivilege 1640 WerFault.exe Token: SeDebugPrivilege 1640 WerFault.exe Token: SeIncreaseQuotaPrivilege 3840 powershell.exe Token: SeSecurityPrivilege 3840 powershell.exe Token: SeTakeOwnershipPrivilege 3840 powershell.exe Token: SeLoadDriverPrivilege 3840 powershell.exe Token: SeSystemProfilePrivilege 3840 powershell.exe Token: SeSystemtimePrivilege 3840 powershell.exe Token: SeProfSingleProcessPrivilege 3840 powershell.exe Token: SeIncBasePriorityPrivilege 3840 powershell.exe Token: SeCreatePagefilePrivilege 3840 powershell.exe Token: SeBackupPrivilege 3840 powershell.exe Token: SeRestorePrivilege 3840 powershell.exe Token: SeShutdownPrivilege 3840 powershell.exe Token: SeDebugPrivilege 3840 powershell.exe Token: SeSystemEnvironmentPrivilege 3840 powershell.exe Token: SeRemoteShutdownPrivilege 3840 powershell.exe Token: SeUndockPrivilege 3840 powershell.exe Token: SeManageVolumePrivilege 3840 powershell.exe Token: 33 3840 powershell.exe Token: 34 3840 powershell.exe Token: 35 3840 powershell.exe Token: 36 3840 powershell.exe -
Suspicious use of WriteProcessMemory 95 IoCs
Processes:
system32.bin.exedescription pid process target process PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe PID 3900 wrote to memory of 1756 3900 system32.bin.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\system32.bin.exe"C:\Users\Admin\AppData\Local\Temp\system32.bin.exe"1⤵
- Loads dropped DLL
- Modifies service
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Blacklisted process makes network request
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "COPY /Y /B "C:\Users\Admin\AppData\Local\Temp\system32.bin.exe" "C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\System32.exe""3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "COPY /Y /B "C:\Users\Admin\AppData\Local\Temp\a5961048.lnk" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.lnk""3⤵
- Drops startup file
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 14563⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell.exe -command "Set-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\"""2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\""3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a5961048.lnkMD5
4b3fa9f8eb3c65a7f557523a071cc969
SHA1eee0dc42a9c6d6d218178885b79355eb7ef9d10e
SHA2561215bf40103a0f012d82378d9f2f6349156334e8c16c70e54dbdd080a9041b17
SHA5121702aa4c9d5225b62b8103a6899cd9a560918aaf9c6c8b67ed926795e996680c4a229e722a38c298532753fb23fb2256a351c42b759da2c6500f4a9e19e55812
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\System32.exeMD5
049ef18418affcd542d9aa545bb07ee3
SHA1994b2b316ed112d81c697294405dcf15f9193deb
SHA2564d056b87049ec7fce672b40190bf8b5f9185395b7313d05bc196a655e7fe0c7a
SHA512ad0b3ab61327d0cc802d3512db80a60be264a52b8f0f750c9d83b4750d1373c59466d399da8650523d6e99723d75e962176ece9f669310f464844c5c2370886c
-
\Users\Admin\AppData\Local\Temp\etchings.dllMD5
9aba0224ea651e03776eb21671f8a743
SHA187aa10ba47a85b2124bf77d00182d714d9cfb233
SHA25651c3bfd80d36a77b97d643dbc66d2b6a3662e5316d7ba357431d562f96977725
SHA5128c80d045fa4f7362fa3c31c7515d2464a32eb2685bd8d05d156e177d56d1ac703f950f35f138914f5800fdd305ef8388a804039a510628716f2cb3252ab7a239
-
\Users\Admin\AppData\Local\Temp\nst35DC.tmp\System.dllMD5
0d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
memory/1640-27-0x0000000004E20000-0x0000000004E21000-memory.dmpFilesize
4KB
-
memory/1640-18-0x0000000004930000-0x0000000004931000-memory.dmpFilesize
4KB
-
memory/1640-15-0x0000000004530000-0x0000000004531000-memory.dmpFilesize
4KB
-
memory/1640-16-0x0000000004530000-0x0000000004531000-memory.dmpFilesize
4KB
-
memory/1756-4-0x0000000000000000-mapping.dmp
-
memory/1756-25-0x0000000000000000-mapping.dmp
-
memory/1756-24-0x0000000000000000-mapping.dmp
-
memory/1756-23-0x0000000000000000-mapping.dmp
-
memory/1756-21-0x0000000000000000-mapping.dmp
-
memory/1756-22-0x0000000000000000-mapping.dmp
-
memory/1756-20-0x0000000000000000-mapping.dmp
-
memory/1756-5-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB
-
memory/1756-19-0x0000000000000000-mapping.dmp
-
memory/1756-26-0x0000000000000000-mapping.dmp
-
memory/2232-6-0x0000000000000000-mapping.dmp
-
memory/2300-7-0x0000000000000000-mapping.dmp
-
memory/3416-10-0x0000000000000000-mapping.dmp
-
memory/3840-14-0x0000024155180000-0x0000024155181000-memory.dmpFilesize
4KB
-
memory/3840-13-0x000002413AC60000-0x000002413AC61000-memory.dmpFilesize
4KB
-
memory/3840-12-0x00007FFA515B0000-0x00007FFA51F9C000-memory.dmpFilesize
9.9MB
-
memory/3840-11-0x0000000000000000-mapping.dmp
-
memory/3900-3-0x0000000002D60000-0x0000000002DE5000-memory.dmpFilesize
532KB
-
memory/3900-2-0x0000000002240000-0x0000000002251000-memory.dmpFilesize
68KB