Analysis
-
max time kernel
89s -
max time network
92s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
22-09-2021 05:42
Static task
static1
Behavioral task
behavioral1
Sample
f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe
Resource
win10v20210408
General
-
Target
f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe
-
Size
560KB
-
MD5
863a8a21eb99b20d4220540da5bc05c3
-
SHA1
8c6b6b2922f8e5855b209a89caa85fa5e7141e36
-
SHA256
f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845
-
SHA512
d02989d098a89a4ca5072442156b2ed4a0f369c78b32402e2558e4083fd9522f7fe35f95f7959ed8471d7901bf59ae1ebdbb107feffe105de147a7f355faa4f4
Malware Config
Extracted
raccoon
3a0693aace391ad57b292defd202847793de4c76
-
url4cnc
https://telete.in/agrybirdsgamerept
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 5 IoCs
pid Process 4000 f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe 4000 f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe 4000 f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe 4000 f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe 4000 f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
pid Process 740 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4000 wrote to memory of 732 4000 f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe 68 PID 4000 wrote to memory of 732 4000 f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe 68 PID 4000 wrote to memory of 732 4000 f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe 68 PID 732 wrote to memory of 740 732 cmd.exe 70 PID 732 wrote to memory of 740 732 cmd.exe 70 PID 732 wrote to memory of 740 732 cmd.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe"C:\Users\Admin\AppData\Local\Temp\f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:740
-
-