Analysis
-
max time kernel
186s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 02:43
Static task
static1
Behavioral task
behavioral1
Sample
0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe
Resource
win10v2004-20220414-en
General
-
Target
0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe
-
Size
516KB
-
MD5
a77b9e35defc578f734e2d95f96e2a31
-
SHA1
f33bcfb0ee9d064b2f5bc55f3a0de16391af3aaa
-
SHA256
0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d
-
SHA512
c456633dd2295f607e56570ce9ca7e424ba0273aa4c42589220eac2f77b603f74dc6184e638d2598bc0c384a140467c93222e9d8ee29b6b56369dced2a8d9e0a
Malware Config
Extracted
raccoon
87602aad8b4abffeb6a1ca955b58feb09879eb88
-
url4cnc
https://telete.in/jhummybear11
Signatures
-
Raccoon Stealer Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/508-135-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon behavioral2/memory/508-136-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon behavioral2/memory/508-137-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon behavioral2/memory/508-138-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon -
Drops startup file 2 IoCs
Processes:
0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update_.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update_.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exedescription pid process target process PID 372 set thread context of 508 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
Processes:
0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exepid process 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exedescription pid process Token: SeDebugPrivilege 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exedescription pid process target process PID 372 wrote to memory of 508 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe PID 372 wrote to memory of 508 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe PID 372 wrote to memory of 508 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe PID 372 wrote to memory of 508 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe PID 372 wrote to memory of 508 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe PID 372 wrote to memory of 508 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe PID 372 wrote to memory of 508 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe PID 372 wrote to memory of 508 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe PID 372 wrote to memory of 508 372 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe 0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe"C:\Users\Admin\AppData\Local\Temp\0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe"C:\Users\Admin\AppData\Local\Temp\0879a1d94561690c9ce842aa49183083e72304edaf2e54650f00f262e719429d.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/372-130-0x0000000000860000-0x00000000008E6000-memory.dmpFilesize
536KB
-
memory/372-131-0x0000000005910000-0x0000000005EB4000-memory.dmpFilesize
5.6MB
-
memory/372-132-0x0000000005360000-0x00000000053F2000-memory.dmpFilesize
584KB
-
memory/372-133-0x0000000005860000-0x00000000058FC000-memory.dmpFilesize
624KB
-
memory/372-139-0x0000000006420000-0x000000000642A000-memory.dmpFilesize
40KB
-
memory/508-134-0x0000000000000000-mapping.dmp
-
memory/508-135-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/508-136-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/508-137-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/508-138-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB