Analysis

  • max time kernel
    144s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    29-10-2021 23:37

General

  • Target

    3b62e9c30b398554f476147d4386f2c6.exe

  • Size

    591KB

  • MD5

    3b62e9c30b398554f476147d4386f2c6

  • SHA1

    7d45a88064af2c0f161bc682eba5244168ee1554

  • SHA256

    f7066f5159f83c1266329e7e8bf27abe5fa6f481da98e3b31c3f8e3cc1af7f06

  • SHA512

    a689b6669291240ec859eac2eb9f71796b00a24eef93e823d51211fd375c77fe3eae147e97671281d73152dfdf0d3ae0a79b399ed8a691436ee8229c3b463c14

Malware Config

Extracted

Family

raccoon

Botnet

b176c5fe76fc027de7ad67f52792266419904252

Attributes
  • url4cnc

    http://telegalive.top/hoverpattern31

    http://toptelete.top/hoverpattern31

    http://telegraf.top/hoverpattern31

    https://t.me/hoverpattern31

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b62e9c30b398554f476147d4386f2c6.exe
    "C:\Users\Admin\AppData\Local\Temp\3b62e9c30b398554f476147d4386f2c6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 480
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1900-59-0x0000000000000000-mapping.dmp
  • memory/1900-60-0x0000000000850000-0x0000000000851000-memory.dmp
    Filesize

    4KB

  • memory/1980-55-0x000000000304D000-0x000000000309C000-memory.dmp
    Filesize

    316KB

  • memory/1980-56-0x0000000075D41000-0x0000000075D43000-memory.dmp
    Filesize

    8KB

  • memory/1980-57-0x0000000000220000-0x00000000002AE000-memory.dmp
    Filesize

    568KB

  • memory/1980-58-0x0000000000400000-0x0000000002BEE000-memory.dmp
    Filesize

    39.9MB