Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
22-09-2021 07:13
Static task
static1
Behavioral task
behavioral1
Sample
863a8a21eb99b20d4220540da5bc05c3.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
863a8a21eb99b20d4220540da5bc05c3.exe
Resource
win10-en-20210920
General
-
Target
863a8a21eb99b20d4220540da5bc05c3.exe
-
Size
560KB
-
MD5
863a8a21eb99b20d4220540da5bc05c3
-
SHA1
8c6b6b2922f8e5855b209a89caa85fa5e7141e36
-
SHA256
f97dba49c60aecda455799132bacbfbca94c45e2eee2e9b01c11a485e53a4845
-
SHA512
d02989d098a89a4ca5072442156b2ed4a0f369c78b32402e2558e4083fd9522f7fe35f95f7959ed8471d7901bf59ae1ebdbb107feffe105de147a7f355faa4f4
Malware Config
Extracted
raccoon
3a0693aace391ad57b292defd202847793de4c76
-
url4cnc
https://telete.in/agrybirdsgamerept
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 5 IoCs
pid Process 2384 863a8a21eb99b20d4220540da5bc05c3.exe 2384 863a8a21eb99b20d4220540da5bc05c3.exe 2384 863a8a21eb99b20d4220540da5bc05c3.exe 2384 863a8a21eb99b20d4220540da5bc05c3.exe 2384 863a8a21eb99b20d4220540da5bc05c3.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
pid Process 2192 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3488 2384 863a8a21eb99b20d4220540da5bc05c3.exe 69 PID 2384 wrote to memory of 3488 2384 863a8a21eb99b20d4220540da5bc05c3.exe 69 PID 2384 wrote to memory of 3488 2384 863a8a21eb99b20d4220540da5bc05c3.exe 69 PID 3488 wrote to memory of 2192 3488 cmd.exe 71 PID 3488 wrote to memory of 2192 3488 cmd.exe 71 PID 3488 wrote to memory of 2192 3488 cmd.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\863a8a21eb99b20d4220540da5bc05c3.exe"C:\Users\Admin\AppData\Local\Temp\863a8a21eb99b20d4220540da5bc05c3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\863a8a21eb99b20d4220540da5bc05c3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2192
-
-