Analysis

  • max time kernel
    37s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    22-01-2021 07:24

General

  • Target

    f7d51f78838308cdcd53b9c4f4af65e1.exe

  • Size

    1.0MB

  • MD5

    f7d51f78838308cdcd53b9c4f4af65e1

  • SHA1

    cddc4f2499ffb79666db8b8c38d9f2c74b9ab219

  • SHA256

    f5758fdd9563e9b445b84a1644d9c37b3ff16903b67e7e05872c068ddd6be0c6

  • SHA512

    3134ca19c1c0fe12a769b51909edfcc8da51b927e6414c7305d23280b8778de404759b8a56cd716a4c9fbda3f5e6b44ece160bceaa762011b35a3b40e930ae5e

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7d51f78838308cdcd53b9c4f4af65e1.exe
    "C:\Users\Admin\AppData\Local\Temp\f7d51f78838308cdcd53b9c4f4af65e1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\covhostjv.exe
      "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\covhostjv.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\covhostjv.exe
        "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\covhostjv.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1364
        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\covhostjv.exe
          "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\covhostjv.exe"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:952

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\covhostjv.exe
    MD5

    183d8e2e66b0cc0b44199f82bcac409f

    SHA1

    800b313a0c2dad044112e66d7f430cb30371a9fc

    SHA256

    2be73cf9d5b07b73a092e85ef80808c11bba51f2248ce75c2ce08123c0e655d2

    SHA512

    e04f75f75e54b5b8464a9d828422647a5914e3f81c9f8d6262aa7cbe7bca06e43e7451b2462f62ce4b744e301e702fce9b1417b27d22a43447bbb7d4c4b39db9

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\covhostjv.exe
    MD5

    183d8e2e66b0cc0b44199f82bcac409f

    SHA1

    800b313a0c2dad044112e66d7f430cb30371a9fc

    SHA256

    2be73cf9d5b07b73a092e85ef80808c11bba51f2248ce75c2ce08123c0e655d2

    SHA512

    e04f75f75e54b5b8464a9d828422647a5914e3f81c9f8d6262aa7cbe7bca06e43e7451b2462f62ce4b744e301e702fce9b1417b27d22a43447bbb7d4c4b39db9

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\covhostjv.exe
    MD5

    bc3e3ff5d9362e269d9ba267fe26497c

    SHA1

    52beeb5f353924f0b0e539003fda2cb2f9d1f6f5

    SHA256

    01cbca3c98feadb7b17074fb42ac6b590738eefec4d9044c1796d446c86e5d29

    SHA512

    cac2615b417331c3428f3f0fa65e59f36a995a5284ba414a1302e3e5020417c6f11ff922617ed8d0c3ad0f8055cd4280079d9a87ccd9434fd0de4530120abf28

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\covhostjv.exe
    MD5

    bc3e3ff5d9362e269d9ba267fe26497c

    SHA1

    52beeb5f353924f0b0e539003fda2cb2f9d1f6f5

    SHA256

    01cbca3c98feadb7b17074fb42ac6b590738eefec4d9044c1796d446c86e5d29

    SHA512

    cac2615b417331c3428f3f0fa65e59f36a995a5284ba414a1302e3e5020417c6f11ff922617ed8d0c3ad0f8055cd4280079d9a87ccd9434fd0de4530120abf28

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\covhostjv.exe
    MD5

    bc3e3ff5d9362e269d9ba267fe26497c

    SHA1

    52beeb5f353924f0b0e539003fda2cb2f9d1f6f5

    SHA256

    01cbca3c98feadb7b17074fb42ac6b590738eefec4d9044c1796d446c86e5d29

    SHA512

    cac2615b417331c3428f3f0fa65e59f36a995a5284ba414a1302e3e5020417c6f11ff922617ed8d0c3ad0f8055cd4280079d9a87ccd9434fd0de4530120abf28

  • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\covhostjv.exe
    MD5

    183d8e2e66b0cc0b44199f82bcac409f

    SHA1

    800b313a0c2dad044112e66d7f430cb30371a9fc

    SHA256

    2be73cf9d5b07b73a092e85ef80808c11bba51f2248ce75c2ce08123c0e655d2

    SHA512

    e04f75f75e54b5b8464a9d828422647a5914e3f81c9f8d6262aa7cbe7bca06e43e7451b2462f62ce4b744e301e702fce9b1417b27d22a43447bbb7d4c4b39db9

  • \Users\Admin\AppData\Local\Temp\7ZipSfx.001\covhostjv.exe
    MD5

    bc3e3ff5d9362e269d9ba267fe26497c

    SHA1

    52beeb5f353924f0b0e539003fda2cb2f9d1f6f5

    SHA256

    01cbca3c98feadb7b17074fb42ac6b590738eefec4d9044c1796d446c86e5d29

    SHA512

    cac2615b417331c3428f3f0fa65e59f36a995a5284ba414a1302e3e5020417c6f11ff922617ed8d0c3ad0f8055cd4280079d9a87ccd9434fd0de4530120abf28

  • \Users\Admin\AppData\Local\Temp\7ZipSfx.001\covhostjv.exe
    MD5

    bc3e3ff5d9362e269d9ba267fe26497c

    SHA1

    52beeb5f353924f0b0e539003fda2cb2f9d1f6f5

    SHA256

    01cbca3c98feadb7b17074fb42ac6b590738eefec4d9044c1796d446c86e5d29

    SHA512

    cac2615b417331c3428f3f0fa65e59f36a995a5284ba414a1302e3e5020417c6f11ff922617ed8d0c3ad0f8055cd4280079d9a87ccd9434fd0de4530120abf28

  • memory/952-21-0x000000000043FA56-mapping.dmp
  • memory/1108-2-0x00000000760D1000-0x00000000760D3000-memory.dmp
    Filesize

    8KB

  • memory/1364-13-0x0000000000ED0000-0x0000000000ED1000-memory.dmp
    Filesize

    4KB

  • memory/1364-15-0x0000000000320000-0x0000000000337000-memory.dmp
    Filesize

    92KB

  • memory/1364-16-0x0000000000350000-0x000000000036F000-memory.dmp
    Filesize

    124KB

  • memory/1364-17-0x0000000004520000-0x0000000004521000-memory.dmp
    Filesize

    4KB

  • memory/1364-18-0x00000000005F0000-0x00000000005FA000-memory.dmp
    Filesize

    40KB

  • memory/1364-12-0x0000000073E00000-0x00000000744EE000-memory.dmp
    Filesize

    6.9MB

  • memory/1364-9-0x0000000000000000-mapping.dmp
  • memory/1464-4-0x0000000000000000-mapping.dmp