Analysis

  • max time kernel
    108s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-11-2020 23:17

General

  • Target

    8f3d2ecd0612dd35e0236219aa59ebaa3b2628764356f1a4ca93a8b2887e9ccb.exe

  • Size

    514KB

  • MD5

    1485c59ea69f380b4c6f26a18ca9c970

  • SHA1

    743a83ccaa5a17cf085a5e6f5332de7e067a9a77

  • SHA256

    8f3d2ecd0612dd35e0236219aa59ebaa3b2628764356f1a4ca93a8b2887e9ccb

  • SHA512

    9aacaace02330a2bb48909d3c56aa4e9ea838e9854e8ef22f6bb88f22cd1d6cbfd67955259548c749bad25e88733b9cd29bb9321c87e8ab717a2bfbc174882fc

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f3d2ecd0612dd35e0236219aa59ebaa3b2628764356f1a4ca93a8b2887e9ccb.exe
    "C:\Users\Admin\AppData\Local\Temp\8f3d2ecd0612dd35e0236219aa59ebaa3b2628764356f1a4ca93a8b2887e9ccb.exe"
    1⤵
    • Modifies system certificate store
    PID:1360

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1360-0-0x00000000024B7000-0x00000000024B8000-memory.dmp
    Filesize

    4KB

  • memory/1360-1-0x0000000003D00000-0x0000000003D11000-memory.dmp
    Filesize

    68KB