Analysis

  • max time kernel
    126s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    20-01-2022 12:17

General

  • Target

    bd1deb82ba2140eae3299f419783bab0.exe

  • Size

    670KB

  • MD5

    bd1deb82ba2140eae3299f419783bab0

  • SHA1

    f124c0e4ad7be58a85271f74b8c9e5d671d70aba

  • SHA256

    b31474d8c16181a103a6ac36d9277eb7ac5dbb7261cfa74f82adbc8b2d06d3fa

  • SHA512

    458d1039347120665ccc01489e3185e660b442b4e47dab534d5591e5aabd2473eaa5d8f0710c0c3aeebf28ccc95007529357add14bae6d8b212789cae06bc846

Malware Config

Extracted

Family

raccoon

Version

1.8.5

Botnet

470193d69fd872b73819c5e70dc68242c10ccbce

Attributes
  • url4cnc

    http://185.163.204.22/capibar

    http://178.62.113.205/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Sets service image path in registry 2 TTPs
  • Modifies data under HKEY_USERS 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd1deb82ba2140eae3299f419783bab0.exe
    "C:\Users\Admin\AppData\Local\Temp\bd1deb82ba2140eae3299f419783bab0.exe"
    1⤵
      PID:1820
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 77f76617986e42ebcd4f379bc33d69d5 usKK10gzFUaaKekVHlVCEA.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:1412
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k wusvcs -p
      1⤵
        PID:2936

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1820-130-0x00000000008A0000-0x0000000000911000-memory.dmp
        Filesize

        452KB

      • memory/1820-131-0x0000000000C50000-0x0000000000CE3000-memory.dmp
        Filesize

        588KB

      • memory/1820-132-0x0000000000400000-0x0000000000619000-memory.dmp
        Filesize

        2.1MB

      • memory/1820-133-0x0000000000950000-0x0000000000A2F000-memory.dmp
        Filesize

        892KB

      • memory/1820-134-0x0000000000400000-0x0000000000619000-memory.dmp
        Filesize

        2.1MB

      • memory/1820-135-0x0000000000CF0000-0x0000000000D82000-memory.dmp
        Filesize

        584KB

      • memory/1820-136-0x0000000000400000-0x0000000000619000-memory.dmp
        Filesize

        2.1MB