Analysis

  • max time kernel
    37s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-11-2020 17:44

General

  • Target

    0a960704c8bcb0ed112cfe822f2ddb664669ffbddbdc936eb57976949db0faf9.exe

  • Size

    485KB

  • MD5

    0188db2bc266f5a2ed558ead41ef284d

  • SHA1

    3450f799120b5b03e24dd12224b162902c54b8a8

  • SHA256

    0a960704c8bcb0ed112cfe822f2ddb664669ffbddbdc936eb57976949db0faf9

  • SHA512

    920a3674f21162027553d398c66c808e283ea25990c6ef8852ed1265c2a85759322b5f0cc0355cca16a19abf89c30c616e476a336edfa4bafb238da59eb6b4b9

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a960704c8bcb0ed112cfe822f2ddb664669ffbddbdc936eb57976949db0faf9.exe
    "C:\Users\Admin\AppData\Local\Temp\0a960704c8bcb0ed112cfe822f2ddb664669ffbddbdc936eb57976949db0faf9.exe"
    1⤵
    • Modifies system certificate store
    PID:1068

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1068-0-0x0000000000E35000-0x0000000000E36000-memory.dmp
    Filesize

    4KB

  • memory/1068-1-0x00000000010E0000-0x00000000010F1000-memory.dmp
    Filesize

    68KB