Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-04-2022 11:03
Static task
static1
Behavioral task
behavioral1
Sample
5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe
Resource
win10v2004-20220414-en
General
-
Target
5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe
-
Size
1.7MB
-
MD5
1d55cd27d142396c39e7d29f1b6e6370
-
SHA1
efc250b5b8cea38628763a9f6d68eba3471be757
-
SHA256
5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811
-
SHA512
af250f2195feda5b2a3c31be6d0f1a3fc7c9ac96cbd9533bfe3dc3b1ad1d6a56cf4d4965141f3d08243c9dc7de0ff1580996164e70668f2cd58e9d0bbd3998a5
Malware Config
Extracted
raccoon
c763e433ef51ff4b6c545800e4ba3b3b1a2ea077
-
url4cnc
https://telete.in/jbitchsucks
Signatures
-
Raccoon Stealer Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/964-65-0x0000000000140000-0x00000000001D3000-memory.dmp family_raccoon behavioral1/memory/964-67-0x0000000000140000-0x00000000001D3000-memory.dmp family_raccoon behavioral1/memory/964-70-0x000000000043FF20-mapping.dmp family_raccoon behavioral1/memory/964-71-0x0000000000140000-0x00000000001D3000-memory.dmp family_raccoon behavioral1/memory/964-74-0x0000000000140000-0x00000000001D3000-memory.dmp family_raccoon behavioral1/memory/964-78-0x0000000000140000-0x00000000001D3000-memory.dmp family_raccoon -
Loads dropped DLL 2 IoCs
Processes:
5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exepid process 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exedescription pid process target process PID 1940 set thread context of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exepid process 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exedescription pid process Token: SeDebugPrivilege 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe Token: SeTakeOwnershipPrivilege 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe Token: SeRestorePrivilege 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exedescription pid process target process PID 1940 wrote to memory of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe PID 1940 wrote to memory of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe PID 1940 wrote to memory of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe PID 1940 wrote to memory of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe PID 1940 wrote to memory of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe PID 1940 wrote to memory of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe PID 1940 wrote to memory of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe PID 1940 wrote to memory of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe PID 1940 wrote to memory of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe PID 1940 wrote to memory of 964 1940 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe 5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe"C:\Users\Admin\AppData\Local\Temp\5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe"C:\Users\Admin\AppData\Local\Temp\5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\b35bc50e-fc56-4239-a7d0-bb79118b31c9\AgileDotNetRT.dllFilesize
94KB
MD514ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
\Users\Admin\AppData\Local\Temp\e34dd831-6d57-4d92-81ec-c008864dca6e\AgileDotNetRT.dllFilesize
94KB
MD514ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
memory/964-67-0x0000000000140000-0x00000000001D3000-memory.dmpFilesize
588KB
-
memory/964-60-0x0000000000140000-0x00000000001D3000-memory.dmpFilesize
588KB
-
memory/964-61-0x0000000000140000-0x00000000001D3000-memory.dmpFilesize
588KB
-
memory/964-63-0x0000000000140000-0x00000000001D3000-memory.dmpFilesize
588KB
-
memory/964-65-0x0000000000140000-0x00000000001D3000-memory.dmpFilesize
588KB
-
memory/964-70-0x000000000043FF20-mapping.dmp
-
memory/964-71-0x0000000000140000-0x00000000001D3000-memory.dmpFilesize
588KB
-
memory/964-74-0x0000000000140000-0x00000000001D3000-memory.dmpFilesize
588KB
-
memory/964-77-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/964-78-0x0000000000140000-0x00000000001D3000-memory.dmpFilesize
588KB
-
memory/1940-58-0x0000000000760000-0x000000000077C000-memory.dmpFilesize
112KB
-
memory/1940-55-0x0000000000640000-0x0000000000678000-memory.dmpFilesize
224KB
-
memory/1940-54-0x0000000000820000-0x00000000009E0000-memory.dmpFilesize
1.8MB