Analysis

  • max time kernel
    85s
  • max time network
    165s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    20-06-2021 19:02

General

  • Target

    13333D8111107CCE84E50C0264E4B3FFA7AF34802DE26.exe

  • Size

    396KB

  • MD5

    01f848f1bea5fee38c9b3ace82d48517

  • SHA1

    bd35c42b99d9c5e4e136505030f3d8f62f33d04f

  • SHA256

    13333d8111107cce84e50c0264e4b3ffa7af34802de26de7d229ca86782db674

  • SHA512

    e86e4f88f5ba7d1dcfad9f04b937dbc4c858b4bfdf51f94fe89f4e37d210b23aec40624a5b7c42f9d66d096dc174dcb6d30bae54d06cfe603ff6a837d707786f

Malware Config

Extracted

Family

raccoon

Botnet

16992cd33145ccbb6feeacb4e84400a56448fa14

Attributes
  • url4cnc

    https://telete.in/baudemars

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13333D8111107CCE84E50C0264E4B3FFA7AF34802DE26.exe
    "C:\Users\Admin\AppData\Local\Temp\13333D8111107CCE84E50C0264E4B3FFA7AF34802DE26.exe"
    1⤵
      PID:3944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 872
        2⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1296

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3944-114-0x0000000002BE0000-0x0000000002D2A000-memory.dmp
      Filesize

      1.3MB

    • memory/3944-115-0x0000000000400000-0x0000000002BD3000-memory.dmp
      Filesize

      39.8MB