Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
09-08-2021 08:08
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210809-095748.exe
Resource
win7v20210408
General
-
Target
usfive_20210809-095748.exe
-
Size
511KB
-
MD5
4be0cbe1709ca5653bcc77a22511dd46
-
SHA1
c4492e5cfe705f705fb08bcb3dfe0b30af408d36
-
SHA256
244d3624209d79d74194422cb15ca209f957088aa1ee87a7cffadd0d6d3dfbc1
-
SHA512
b769a084d811065e8f14fced9b8f67d7b1b8b1d557381256f9321da694724cbe3bab9621899a8987ae2429f3a919f1f47c1336d031340d77056387ef0218a790
Malware Config
Extracted
raccoon
c58b0b3f1f90ad7552aaf8e84180b7580f397001
-
url4cnc
https://telete.in/h_electricryptors2
Signatures
-
Raccoon Stealer Payload 2 IoCs
resource yara_rule behavioral2/memory/2204-114-0x00000000048B0000-0x0000000004943000-memory.dmp family_raccoon behavioral2/memory/2204-115-0x0000000000400000-0x0000000002CB5000-memory.dmp family_raccoon -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3828 created 3784 3828 WerFault.exe 78 -
DarkVNC Payload 3 IoCs
resource yara_rule behavioral2/memory/3784-127-0x00000000048E0000-0x0000000004968000-memory.dmp darkvnc behavioral2/memory/3784-129-0x0000000000400000-0x0000000002CA6000-memory.dmp darkvnc behavioral2/memory/4076-131-0x000002CD35220000-0x000002CD352EA000-memory.dmp darkvnc -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3784 FWwQTbgOjX.exe -
Loads dropped DLL 6 IoCs
pid Process 2204 usfive_20210809-095748.exe 2204 usfive_20210809-095748.exe 2204 usfive_20210809-095748.exe 2204 usfive_20210809-095748.exe 2204 usfive_20210809-095748.exe 2204 usfive_20210809-095748.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3784 set thread context of 4076 3784 FWwQTbgOjX.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3828 3784 WerFault.exe 78 -
Delays execution with timeout.exe 1 IoCs
pid Process 3192 timeout.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3784 FWwQTbgOjX.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3828 WerFault.exe Token: SeBackupPrivilege 3828 WerFault.exe Token: SeDebugPrivilege 3828 WerFault.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3784 2204 usfive_20210809-095748.exe 78 PID 2204 wrote to memory of 3784 2204 usfive_20210809-095748.exe 78 PID 2204 wrote to memory of 3784 2204 usfive_20210809-095748.exe 78 PID 2204 wrote to memory of 3568 2204 usfive_20210809-095748.exe 79 PID 2204 wrote to memory of 3568 2204 usfive_20210809-095748.exe 79 PID 2204 wrote to memory of 3568 2204 usfive_20210809-095748.exe 79 PID 3568 wrote to memory of 3192 3568 cmd.exe 81 PID 3568 wrote to memory of 3192 3568 cmd.exe 81 PID 3568 wrote to memory of 3192 3568 cmd.exe 81 PID 3784 wrote to memory of 4076 3784 FWwQTbgOjX.exe 82 PID 3784 wrote to memory of 4076 3784 FWwQTbgOjX.exe 82 PID 3784 wrote to memory of 4076 3784 FWwQTbgOjX.exe 82 PID 3784 wrote to memory of 4076 3784 FWwQTbgOjX.exe 82 PID 3784 wrote to memory of 4076 3784 FWwQTbgOjX.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\usfive_20210809-095748.exe"C:\Users\Admin\AppData\Local\Temp\usfive_20210809-095748.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\FWwQTbgOjX.exe"C:\Users\Admin\AppData\Local\Temp\FWwQTbgOjX.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe3⤵PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 4763⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\usfive_20210809-095748.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:3192
-
-