Analysis

  • max time kernel
    361s
  • max time network
    455s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    06-08-2021 11:49

General

  • Target

    Raccine/RaccineSettings.exe

  • Size

    96KB

  • MD5

    29befacee533f2fefb428c39412df12c

  • SHA1

    179545ba0f23a84ec2506fb743d5c9d3d0408f3a

  • SHA256

    ec15047f8a802cf6cadb5ea3860c380bb3314e9a91a96464dc1837192773ab6a

  • SHA512

    51e518494c892e40107154368976f5c83081d19684473a619eb86376652bba684036e8c91a705f78f1bdbb0c47b16559ce0d1412fcd45f41800d7dac2d512e2d

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Raccine\RaccineSettings.exe
    "C:\Users\Admin\AppData\Local\Temp\Raccine\RaccineSettings.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4024-114-0x000001D2BC970000-0x000001D2BC971000-memory.dmp
    Filesize

    4KB

  • memory/4024-116-0x000001D2D7080000-0x000001D2D7082000-memory.dmp
    Filesize

    8KB