Analysis
-
max time kernel
89s -
max time network
91s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
02-10-2021 10:10
Static task
static1
Behavioral task
behavioral1
Sample
c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe
Resource
win10v20210408
General
-
Target
c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe
-
Size
512KB
-
MD5
de53e8d73fe96e1ceab93e3aee4751ec
-
SHA1
98e010e66213ba828ead9debe86263bca9407509
-
SHA256
c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8
-
SHA512
e2e692971b0fb5b1244b08e952045f6b342f968a2f5ba8f3d28b3e4cd0bf34af89c63a1923ca16991c43e6376cbab113b3c43d194dc8639ce8d04881bfdc95c5
Malware Config
Extracted
raccoon
1.8.2
fd16367b73441d6f39c715f71a74a399a84f0b41
-
url4cnc
http://teletop.top/terra11nc
http://teleta.top/terra11nc
https://t.me/terra11nc
Signatures
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Loads dropped DLL 5 IoCs
pid Process 3492 c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe 3492 c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe 3492 c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe 3492 c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe 3492 c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe -
Accesses Microsoft Outlook profiles 1 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1920 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3492 wrote to memory of 968 3492 c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe 68 PID 3492 wrote to memory of 968 3492 c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe 68 PID 3492 wrote to memory of 968 3492 c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe 68 PID 968 wrote to memory of 1920 968 cmd.exe 70 PID 968 wrote to memory of 1920 968 cmd.exe 70 PID 968 wrote to memory of 1920 968 cmd.exe 70 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe"C:\Users\Admin\AppData\Local\Temp\c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe"1⤵
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3492 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1920
-
-