Analysis

  • max time kernel
    84s
  • max time network
    83s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    06-11-2020 10:54

General

  • Target

    66b1580426a8b8bcfa79ffcbdc1f8e94bd22cf6643dd3f3ff519d30712e4db73.exe

  • Size

    1.3MB

  • MD5

    672c168d4320323398943d1cd1e489df

  • SHA1

    bf8df765b16c756e2f6d0ea4034d7c8366eb3794

  • SHA256

    66b1580426a8b8bcfa79ffcbdc1f8e94bd22cf6643dd3f3ff519d30712e4db73

  • SHA512

    c2e67c8b8a0c91401bc497eca04196b5f0d9a91bf64d97d2bc186c88438d8abc945cb82cc9639ee0a5573858c943beebe7fdf72118b2bdb397a104426d71c0cc

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66b1580426a8b8bcfa79ffcbdc1f8e94bd22cf6643dd3f3ff519d30712e4db73.exe
    "C:\Users\Admin\AppData\Local\Temp\66b1580426a8b8bcfa79ffcbdc1f8e94bd22cf6643dd3f3ff519d30712e4db73.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Users\Admin\AppData\Local\Temp\66b1580426a8b8bcfa79ffcbdc1f8e94bd22cf6643dd3f3ff519d30712e4db73.exe
      "C:\Users\Admin\AppData\Local\Temp\66b1580426a8b8bcfa79ffcbdc1f8e94bd22cf6643dd3f3ff519d30712e4db73.exe"
      2⤵
      • Modifies system certificate store
      PID:1256

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1032-0-0x0000000073C60000-0x000000007434E000-memory.dmp
    Filesize

    6.9MB

  • memory/1032-1-0x0000000000B10000-0x0000000000B11000-memory.dmp
    Filesize

    4KB

  • memory/1032-3-0x0000000000290000-0x000000000029F000-memory.dmp
    Filesize

    60KB

  • memory/1032-4-0x0000000000500000-0x0000000000506000-memory.dmp
    Filesize

    24KB

  • memory/1256-5-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB

  • memory/1256-6-0x000000000043FA98-mapping.dmp
  • memory/1256-7-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB