Overview
overview
10Static
static
Raccine/ya...32.exe
windows10_x64
6Raccine/ya...64.exe
windows10_x64
1Raccine/ya...32.exe
windows10_x64
1Raccine/ya...64.exe
windows10_x64
1Raccine/Raccine.exe
windows10_x64
10Raccine/Ra...fg.exe
windows10_x64
1Raccine/Ra...nc.exe
windows10_x64
1Raccine/Ra...gs.exe
windows10_x64
1Raccine/Ra...86.exe
windows10_x64
10Raccine/in...ne.bat
windows10_x64
8Raccine/pr...NU.exe
windows10_x64
8Raccine/pr...64.exe
windows10_x64
8Raccine/pr...86.exe
windows10_x64
7Raccine/sc...ng.bat
windows10_x64
1Analysis
-
max time kernel
361s -
max time network
1450s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-08-2021 11:49
Static task
static1
Behavioral task
behavioral1
Sample
Raccine/yara/yara32.exe
Resource
win10v20210408
Behavioral task
behavioral2
Sample
Raccine/yara/yara64.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
Raccine/yara/yarac32.exe
Resource
win10v20210410
Behavioral task
behavioral4
Sample
Raccine/yara/yarac64.exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
Raccine/Raccine.exe
Resource
win10v20210410
Behavioral task
behavioral6
Sample
Raccine/RaccineElevatedCfg.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
Raccine/RaccineRulesSync.exe
Resource
win10v20210408
Behavioral task
behavioral8
Sample
Raccine/RaccineSettings.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
Raccine/Raccine_x86.exe
Resource
win10v20210408
Behavioral task
behavioral10
Sample
Raccine/install-raccine.bat
Resource
win10v20210410
Behavioral task
behavioral11
Sample
Raccine/preqeq/NDP462-KB3151800-x86-x64-AllOS-ENU.exe
Resource
win10v20210408
Behavioral task
behavioral12
Sample
Raccine/preqeq/vc_redist.x64.exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
Raccine/preqeq/vc_redist.x86.exe
Resource
win10v20210408
Behavioral task
behavioral14
Sample
Raccine/scripts/windows-hardening.bat
Resource
win10v20210410
General
-
Target
Raccine/preqeq/vc_redist.x64.exe
-
Size
24.0MB
-
MD5
fb1cb75f59d98b5d1e1e31476cbe6f61
-
SHA1
10d155cef0ca585d94b24bc4be53c33dcbf91e7e
-
SHA256
a1592d3da2b27230c087a3b069409c1e82c2664b0d4c3b511701624702b2e2a3
-
SHA512
109f087ba2021e1ac85c404c202822f01dbc056acc933bf6ca30b67fc0f48711eb8f58ae15c4e4eb0693e80ecbd4fdf59df172244189c3f96fae1c329b77263e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vc_redist.x64.exepid process 1900 vc_redist.x64.exe -
Loads dropped DLL 1 IoCs
Processes:
vc_redist.x64.exepid process 1900 vc_redist.x64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
vc_redist.x64.exedescription pid process target process PID 772 wrote to memory of 1900 772 vc_redist.x64.exe vc_redist.x64.exe PID 772 wrote to memory of 1900 772 vc_redist.x64.exe vc_redist.x64.exe PID 772 wrote to memory of 1900 772 vc_redist.x64.exe vc_redist.x64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Raccine\preqeq\vc_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\Raccine\preqeq\vc_redist.x64.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\{263067C7-F09A-4155-B1CD-B794E5DFDB16}\.cr\vc_redist.x64.exe"C:\Windows\Temp\{263067C7-F09A-4155-B1CD-B794E5DFDB16}\.cr\vc_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\Raccine\preqeq\vc_redist.x64.exe" -burn.filehandle.attached=604 -burn.filehandle.self=6082⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Temp\{263067C7-F09A-4155-B1CD-B794E5DFDB16}\.cr\vc_redist.x64.exeMD5
479f17e8a89247f506b5e4ab02b2ec37
SHA1d7264231d435f0bc3bb3924585d36511cc931724
SHA2565c63fbfc51c34baea36bcaecb32b24f445e4709bae693554736d510c43b21962
SHA512c606dae9e7c4f0d55a72837f1a68df9dd36a1524ac4c3fd43bbb8314b90e9b0755ece7cd648477fe740e54e7c5219d7c4d39dd2b23a445bac2a17d9b54e79fa9
-
C:\Windows\Temp\{263067C7-F09A-4155-B1CD-B794E5DFDB16}\.cr\vc_redist.x64.exeMD5
479f17e8a89247f506b5e4ab02b2ec37
SHA1d7264231d435f0bc3bb3924585d36511cc931724
SHA2565c63fbfc51c34baea36bcaecb32b24f445e4709bae693554736d510c43b21962
SHA512c606dae9e7c4f0d55a72837f1a68df9dd36a1524ac4c3fd43bbb8314b90e9b0755ece7cd648477fe740e54e7c5219d7c4d39dd2b23a445bac2a17d9b54e79fa9
-
\Windows\Temp\{E1163A74-7219-4BF6-A39A-46BA6A2A5934}\.ba\wixstdba.dllMD5
eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
memory/1900-114-0x0000000000000000-mapping.dmp