Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    06-11-2020 10:59

General

  • Target

    d87d2c260bb2dc8c9ce5db0b29fbbc9b0e44902a53648bab8ed98b6944ebe5df.exe

  • Size

    403KB

  • MD5

    7906f76f10076ddaf08e38f83ec261e5

  • SHA1

    185dd911e8e14df71c83eeff616f79dff607b04f

  • SHA256

    d87d2c260bb2dc8c9ce5db0b29fbbc9b0e44902a53648bab8ed98b6944ebe5df

  • SHA512

    46bb88bc789e52903c446e3148397bf2f59c674f643bf9f8a0100b5937c24c8a2d16fecfcf5ce08c18ac290d2b037681ec90ffb4cf41d455129efd4dfa1d98ba

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d87d2c260bb2dc8c9ce5db0b29fbbc9b0e44902a53648bab8ed98b6944ebe5df.exe
    "C:\Users\Admin\AppData\Local\Temp\d87d2c260bb2dc8c9ce5db0b29fbbc9b0e44902a53648bab8ed98b6944ebe5df.exe"
    1⤵
    • Modifies system certificate store
    PID:1804

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1804-0-0x000000000070B000-0x000000000070C000-memory.dmp
    Filesize

    4KB

  • memory/1804-1-0x0000000001F10000-0x0000000001F21000-memory.dmp
    Filesize

    68KB