Analysis
-
max time kernel
159s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
14-01-2022 17:13
Static task
static1
General
-
Target
c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe
-
Size
7.0MB
-
MD5
ae6510d9815c44a818f722ecae6844b8
-
SHA1
2a34b5110f5c3c2424ae9685f57261e2546bd963
-
SHA256
c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656
-
SHA512
8caa9e661403d5d86f69e7c35e45cdf927ef9ec0c6045ed2ca5af2eaaf26b4f99291eadaf2f0c8c00a31b05b228c6df0c4bd205a7b3ec70e263313a08ffef4f8
Malware Config
Extracted
Family
raccoon
Version
1.8.4-hotfixs
rc4.plain
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 2456 created 2896 2456 WerFault.exe 71 -
LoaderBot executable 4 IoCs
resource yara_rule behavioral1/memory/1232-160-0x0000000000360000-0x00000000007A6000-memory.dmp loaderbot behavioral1/memory/1232-162-0x0000000000360000-0x00000000007A6000-memory.dmp loaderbot behavioral1/memory/1232-169-0x0000000000360000-0x00000000007A6000-memory.dmp loaderbot behavioral1/memory/1232-170-0x0000000000360000-0x00000000007A6000-memory.dmp loaderbot -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2896 111.exe 1232 2.exe 3116 Driver.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 2.exe -
Loads dropped DLL 15 IoCs
pid Process 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\2.exe" 2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2896 111.exe 1232 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2456 2896 WerFault.exe 71 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1232 2.exe 1232 2.exe 2896 111.exe 2896 111.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe 1232 2.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 632 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1232 2.exe Token: SeRestorePrivilege 2456 WerFault.exe Token: SeBackupPrivilege 2456 WerFault.exe Token: SeDebugPrivilege 2456 WerFault.exe Token: SeLockMemoryPrivilege 3116 Driver.exe Token: SeLockMemoryPrivilege 3116 Driver.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3532 2936 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 68 PID 2936 wrote to memory of 3532 2936 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 68 PID 3532 wrote to memory of 3560 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 69 PID 3532 wrote to memory of 3560 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 69 PID 3560 wrote to memory of 2896 3560 cmd.exe 71 PID 3560 wrote to memory of 2896 3560 cmd.exe 71 PID 3560 wrote to memory of 2896 3560 cmd.exe 71 PID 3532 wrote to memory of 1812 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 72 PID 3532 wrote to memory of 1812 3532 c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe 72 PID 1812 wrote to memory of 1232 1812 cmd.exe 74 PID 1812 wrote to memory of 1232 1812 cmd.exe 74 PID 1812 wrote to memory of 1232 1812 cmd.exe 74 PID 1232 wrote to memory of 3116 1232 2.exe 79 PID 1232 wrote to memory of 3116 1232 2.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe"C:\Users\Admin\AppData\Local\Temp\c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe"C:\Users\Admin\AppData\Local\Temp\c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\111.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\111.exeC:\Users\Admin\AppData\Local\Temp\111.exe4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 8325⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\2.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\2.exeC:\Users\Admin\AppData\Local\Temp\2.exe4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
-
-