Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
07-12-2021 11:01
Static task
static1
Behavioral task
behavioral1
Sample
5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe
Resource
win10-en-20211104
General
-
Target
5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe
-
Size
422KB
-
MD5
c58ab85e86005430cf8b4eb02d203271
-
SHA1
2a8c22a93cfaa5b52d70ccba5a86107dd7955673
-
SHA256
5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0
-
SHA512
f6d0d607707b7b3b3b390053c16e60627f5f58329d060caa35513fe2af466a25124d3b89a3eb7d59cacecd1a86071788e9a6a1ccd9115a3f516c7327dab6f5ce
Malware Config
Extracted
raccoon
1.8.3-hotfix
a2337059abb40b184e621b38e62ace3e1a158d50
-
url4cnc
http://94.158.245.137/papatikmikr03
http://91.219.236.27/papatikmikr03
http://94.158.245.167/papatikmikr03
http://185.163.204.216/papatikmikr03
http://185.225.19.238/papatikmikr03
http://185.163.204.218/papatikmikr03
https://t.me/papatikmikr03
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
4393494146.exepid process 3200 4393494146.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 484 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 484 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.execmd.execmd.exedescription pid process target process PID 3980 wrote to memory of 700 3980 5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe cmd.exe PID 3980 wrote to memory of 700 3980 5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe cmd.exe PID 3980 wrote to memory of 700 3980 5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe cmd.exe PID 700 wrote to memory of 3200 700 cmd.exe 4393494146.exe PID 700 wrote to memory of 3200 700 cmd.exe 4393494146.exe PID 700 wrote to memory of 3200 700 cmd.exe 4393494146.exe PID 3980 wrote to memory of 3988 3980 5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe cmd.exe PID 3980 wrote to memory of 3988 3980 5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe cmd.exe PID 3980 wrote to memory of 3988 3980 5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe cmd.exe PID 3988 wrote to memory of 484 3988 cmd.exe taskkill.exe PID 3988 wrote to memory of 484 3988 cmd.exe taskkill.exe PID 3988 wrote to memory of 484 3988 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe"C:\Users\Admin\AppData\Local\Temp\5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\4393494146.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4393494146.exe"C:\Users\Admin\AppData\Local\Temp\4393494146.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "5c69bc614c6092798cecfa808358e97cda7c0ea53f30e1e124cb14b54cf9f1b0.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4393494146.exeMD5
8dd39ca099bb5850e99ac9dd1c0a8679
SHA1c12ce82e5ddea4f5299b5f0de925c7e7e09faa88
SHA256245df6eba42f4085247e9155c66b3e607f724f648da9ec5a673a75a500318e34
SHA51244b5703d00fc84ab2b25f3b58fed233033851c1eb4e642e5fd6e861e68a3122197ed64c3eed6b6c54810f3e2d5f954e83f4c86d509bc97cad98b35ed11235401
-
C:\Users\Admin\AppData\Local\Temp\4393494146.exeMD5
8dd39ca099bb5850e99ac9dd1c0a8679
SHA1c12ce82e5ddea4f5299b5f0de925c7e7e09faa88
SHA256245df6eba42f4085247e9155c66b3e607f724f648da9ec5a673a75a500318e34
SHA51244b5703d00fc84ab2b25f3b58fed233033851c1eb4e642e5fd6e861e68a3122197ed64c3eed6b6c54810f3e2d5f954e83f4c86d509bc97cad98b35ed11235401
-
memory/484-129-0x0000000000000000-mapping.dmp
-
memory/700-121-0x0000000000000000-mapping.dmp
-
memory/3200-122-0x0000000000000000-mapping.dmp
-
memory/3200-125-0x00000000005A9000-0x00000000005F8000-memory.dmpFilesize
316KB
-
memory/3200-127-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/3200-126-0x0000000001FB0000-0x000000000203F000-memory.dmpFilesize
572KB
-
memory/3980-118-0x0000000000631000-0x000000000065B000-memory.dmpFilesize
168KB
-
memory/3980-120-0x0000000000400000-0x00000000004EA000-memory.dmpFilesize
936KB
-
memory/3980-119-0x00000000004F0000-0x000000000063A000-memory.dmpFilesize
1.3MB
-
memory/3988-128-0x0000000000000000-mapping.dmp