Analysis

  • max time kernel
    11s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-11-2020 14:10

General

  • Target

    e6dd1d0a155d080be961841554f9fc1c82f327cd4129088a3aa873f303a3bb8d.exe

  • Size

    455KB

  • MD5

    836f06411dc672fc46ed79489079e2c3

  • SHA1

    53d1488590b59528d0d47203bd996b2f6876e726

  • SHA256

    e6dd1d0a155d080be961841554f9fc1c82f327cd4129088a3aa873f303a3bb8d

  • SHA512

    0e22864b5e45e3e39f52773aeef4f2b7a456608871353428ba9d31caf86f6054a17abb293c4c3451b3e57c7e3dffe302781b11287c3018695b05e7e39b00d590

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6dd1d0a155d080be961841554f9fc1c82f327cd4129088a3aa873f303a3bb8d.exe
    "C:\Users\Admin\AppData\Local\Temp\e6dd1d0a155d080be961841554f9fc1c82f327cd4129088a3aa873f303a3bb8d.exe"
    1⤵
    • Modifies system certificate store
    PID:1848

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1848-0-0x000000000026B000-0x000000000026C000-memory.dmp
    Filesize

    4KB

  • memory/1848-1-0x0000000001E30000-0x0000000001E41000-memory.dmp
    Filesize

    68KB