Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 21:06
Static task
static1
Behavioral task
behavioral1
Sample
0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe
Resource
win10-en-20211208
General
-
Target
0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe
-
Size
1.2MB
-
MD5
4bb6c620715fe25e76d4cca1e68bef89
-
SHA1
0cf2a7aad7ad7a804ca2b7ccaea1a6aadd75fb80
-
SHA256
0b668d0ac89d5da1526be831f7b8c3f2af54c5dbc68c0c9ce886183ec518c051
-
SHA512
59203e7c93eda1698f25ee000c7be02d39eee5a0c3f615ae6b540c7a76e6d47265d4354fa38be5206810e6b035b8be1794ebe324c0e9db33360a4f0dd3910549
Malware Config
Extracted
raccoon
1.8.3-hotfix
efc20640b4b1564934471e6297b87d8657db774a
-
url4cnc
http://91.219.236.162/jredmankun
http://185.163.47.176/jredmankun
http://193.38.54.238/jredmankun
http://74.119.192.122/jredmankun
http://91.219.236.240/jredmankun
https://t.me/jredmankun
Signatures
-
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exedescription pid process target process PID 344 set thread context of 4388 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exepowershell.exepid process 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 4368 powershell.exe 4368 powershell.exe 4368 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exepowershell.exedescription pid process Token: SeDebugPrivilege 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe Token: SeDebugPrivilege 4368 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exedescription pid process target process PID 344 wrote to memory of 4368 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe powershell.exe PID 344 wrote to memory of 4368 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe powershell.exe PID 344 wrote to memory of 4368 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe powershell.exe PID 344 wrote to memory of 4396 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4396 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4396 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4388 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4388 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4388 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4388 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4388 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4388 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4388 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4388 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe PID 344 wrote to memory of 4388 344 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe 0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe"C:\Users\Admin\AppData\Local\Temp\0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe"C:\Users\Admin\AppData\Local\Temp\0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe"C:\Users\Admin\AppData\Local\Temp\0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/344-118-0x0000000000090000-0x00000000001C4000-memory.dmpFilesize
1.2MB
-
memory/344-119-0x0000000004A50000-0x0000000004AE2000-memory.dmpFilesize
584KB
-
memory/344-120-0x0000000002450000-0x000000000245C000-memory.dmpFilesize
48KB
-
memory/344-121-0x0000000004C70000-0x0000000004C71000-memory.dmpFilesize
4KB
-
memory/344-122-0x00000000050B0000-0x000000000514C000-memory.dmpFilesize
624KB
-
memory/344-123-0x0000000005320000-0x0000000005408000-memory.dmpFilesize
928KB
-
memory/344-124-0x0000000005900000-0x0000000005DFE000-memory.dmpFilesize
5.0MB
-
memory/4368-149-0x0000000008DE0000-0x0000000008DFE000-memory.dmpFilesize
120KB
-
memory/4368-138-0x0000000007CE0000-0x0000000007D2B000-memory.dmpFilesize
300KB
-
memory/4368-129-0x00000000070E0000-0x0000000007708000-memory.dmpFilesize
6.2MB
-
memory/4368-355-0x00000000080B0000-0x00000000080B8000-memory.dmpFilesize
32KB
-
memory/4368-131-0x0000000006AA0000-0x0000000006AA1000-memory.dmpFilesize
4KB
-
memory/4368-132-0x0000000006AA2000-0x0000000006AA3000-memory.dmpFilesize
4KB
-
memory/4368-133-0x0000000006EA0000-0x0000000006EC2000-memory.dmpFilesize
136KB
-
memory/4368-134-0x0000000006F40000-0x0000000006FA6000-memory.dmpFilesize
408KB
-
memory/4368-135-0x0000000007780000-0x00000000077E6000-memory.dmpFilesize
408KB
-
memory/4368-136-0x0000000007910000-0x0000000007C60000-memory.dmpFilesize
3.3MB
-
memory/4368-137-0x0000000007040000-0x000000000705C000-memory.dmpFilesize
112KB
-
memory/4368-128-0x0000000004470000-0x00000000044A6000-memory.dmpFilesize
216KB
-
memory/4368-139-0x0000000008000000-0x0000000008076000-memory.dmpFilesize
472KB
-
memory/4368-148-0x0000000009030000-0x0000000009063000-memory.dmpFilesize
204KB
-
memory/4368-350-0x00000000080C0000-0x00000000080DA000-memory.dmpFilesize
104KB
-
memory/4368-154-0x0000000009160000-0x0000000009205000-memory.dmpFilesize
660KB
-
memory/4368-156-0x0000000006AA3000-0x0000000006AA4000-memory.dmpFilesize
4KB
-
memory/4368-155-0x000000007EB30000-0x000000007EB31000-memory.dmpFilesize
4KB
-
memory/4368-157-0x0000000009320000-0x00000000093B4000-memory.dmpFilesize
592KB
-
memory/4388-125-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/4388-130-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB