Analysis

  • max time kernel
    26s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    11-11-2020 10:55

General

  • Target

    d72fff3e7da2517c24fcb6aed1fe0b602f283421092dd470be8cee458aa6d6e0.exe

  • Size

    435KB

  • MD5

    ae55d47a050f60be3b3cc00ea8575bc6

  • SHA1

    a5314eb3853a8f07e89d7d6cac031323ebaecdf1

  • SHA256

    d72fff3e7da2517c24fcb6aed1fe0b602f283421092dd470be8cee458aa6d6e0

  • SHA512

    7a868c0252f9231d805cade18d7c312fc1deb61318c13e12f103f0239a439e7686ef799ab4fb90d7662aad7de3de483c027890449ef8f630381b8fe5539b816c

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d72fff3e7da2517c24fcb6aed1fe0b602f283421092dd470be8cee458aa6d6e0.exe
    "C:\Users\Admin\AppData\Local\Temp\d72fff3e7da2517c24fcb6aed1fe0b602f283421092dd470be8cee458aa6d6e0.exe"
    1⤵
    • Modifies system certificate store
    PID:1040

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1040-0-0x000000000354A000-0x000000000354B000-memory.dmp
    Filesize

    4KB

  • memory/1040-1-0x0000000003630000-0x0000000003641000-memory.dmp
    Filesize

    68KB