Analysis

  • max time kernel
    29s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-11-2020 22:41

General

  • Target

    3d007a16f50435b7e246503634c53f46388f4e01259be1c449b3cdfd0c24600f.exe

  • Size

    403KB

  • MD5

    5a368e49aa6ceacf8aa82f6764fecc1a

  • SHA1

    b87f3183f7e571a9d95d2381fe3748734e09fbbb

  • SHA256

    3d007a16f50435b7e246503634c53f46388f4e01259be1c449b3cdfd0c24600f

  • SHA512

    e5b383bc0afaa6026e51ff5972dfaf65142add134fb9608eb9e966edda4b71cae2f71bd1467fdc0dcb04ce973451c3329abd7aed79303e5662627890112013ea

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d007a16f50435b7e246503634c53f46388f4e01259be1c449b3cdfd0c24600f.exe
    "C:\Users\Admin\AppData\Local\Temp\3d007a16f50435b7e246503634c53f46388f4e01259be1c449b3cdfd0c24600f.exe"
    1⤵
    • Modifies system certificate store
    PID:1668

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1668-0-0x00000000006CB000-0x00000000006CC000-memory.dmp
    Filesize

    4KB

  • memory/1668-1-0x0000000001ED0000-0x0000000001EE1000-memory.dmp
    Filesize

    68KB