Analysis

  • max time kernel
    146s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-05-2022 11:47

General

  • Target

    2ed43f85bed23891c761f22ed421c005ba4551fb67d4355bcacd56a7270871c8.exe

  • Size

    18.6MB

  • MD5

    acae63bd282eddc81ba34df297f7acd1

  • SHA1

    6b315d895b86b90da5a3c705c4c0c483a587e691

  • SHA256

    2ed43f85bed23891c761f22ed421c005ba4551fb67d4355bcacd56a7270871c8

  • SHA512

    5bc0e63df4201c160d0ae4b466b74d891a74d4b62f88850c7fe2c63e21644fdc45f09d43bf74578e2c331f09c23e653fe8337b73dca41b04087eeb71a9c79cf0

Malware Config

Extracted

Family

raccoon

Botnet

01477de985736a9649ba17ce7a0e68e3dc416fa9

Attributes
  • url4cnc

    https://telete.in/jmaybech

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon Stealer Payload 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ed43f85bed23891c761f22ed421c005ba4551fb67d4355bcacd56a7270871c8.exe
    "C:\Users\Admin\AppData\Local\Temp\2ed43f85bed23891c761f22ed421c005ba4551fb67d4355bcacd56a7270871c8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\is-EE618.tmp\2ed43f85bed23891c761f22ed421c005ba4551fb67d4355bcacd56a7270871c8.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-EE618.tmp\2ed43f85bed23891c761f22ed421c005ba4551fb67d4355bcacd56a7270871c8.tmp" /SL5="$60124,18722675,848384,C:\Users\Admin\AppData\Local\Temp\2ed43f85bed23891c761f22ed421c005ba4551fb67d4355bcacd56a7270871c8.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Program Files (x86)\Microsoft KB64513\Revo.Uninstaller.Pro.4.3.3.exe
        "C:\Program Files (x86)\Microsoft KB64513\Revo.Uninstaller.Pro.4.3.3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:952
        • C:\Users\Admin\AppData\Local\Temp\is-7NB41.tmp\Revo.Uninstaller.Pro.4.3.3.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-7NB41.tmp\Revo.Uninstaller.Pro.4.3.3.tmp" /SL5="$101B0,16350626,188928,C:\Program Files (x86)\Microsoft KB64513\Revo.Uninstaller.Pro.4.3.3.exe"
          4⤵
          • Executes dropped EXE
          PID:1256
      • C:\Program Files (x86)\Windows NT\f039239f.exe
        "C:\Program Files (x86)\Windows NT\f039239f.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1324
        • C:\Program Files (x86)\Windows NT\f039239f.exe
          "C:\Program Files (x86)\Windows NT\f039239f.exe"
          4⤵
          • Executes dropped EXE
          PID:1780
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Program Files (x86)\Windows NT\lic.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1316
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Program Files (x86)\Windows NT\lic.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1700

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft KB64513\Revo.Uninstaller.Pro.4.3.3.exe
    Filesize

    16.1MB

    MD5

    1540ebe79933021c71b37d11ca590c6e

    SHA1

    5c3f54e29894d5d973e5a06d9b9cf53f723bcacf

    SHA256

    4c4258c10a1e7a0e7ab5529e68467cf23f5835621cff6dae204da456858d622a

    SHA512

    43ffc343ac95b52d62f2e918e8c5d7a65fd59a5f165643dbfadc4610b50d1460bdf561ab6ac0c02aa587abc0992acbaa2af6ef73f1b2ac75371d6d30292bb2d5

  • C:\Program Files (x86)\Microsoft KB64513\Revo.Uninstaller.Pro.4.3.3.exe
    Filesize

    16.1MB

    MD5

    1540ebe79933021c71b37d11ca590c6e

    SHA1

    5c3f54e29894d5d973e5a06d9b9cf53f723bcacf

    SHA256

    4c4258c10a1e7a0e7ab5529e68467cf23f5835621cff6dae204da456858d622a

    SHA512

    43ffc343ac95b52d62f2e918e8c5d7a65fd59a5f165643dbfadc4610b50d1460bdf561ab6ac0c02aa587abc0992acbaa2af6ef73f1b2ac75371d6d30292bb2d5

  • C:\Program Files (x86)\Windows NT\f039239f.exe
    Filesize

    1.8MB

    MD5

    498ee8e0a622a28f152d477ebf142d6e

    SHA1

    8dc76e53a1dab943ee04f74b60be5e993fc74dbe

    SHA256

    551a34381ee16c60338b979253f2e760e9025db180cf97b81fdb7cccbc5ab6fe

    SHA512

    6f0b51f0da103c2a445a13cf12d0c1c71060551bf5444434f88bef951a2cae91f93e7ae097bc92275cdf6f8eeb22beb965dd88e30a88ce9ec3cca3d4701a3820

  • C:\Program Files (x86)\Windows NT\f039239f.exe
    Filesize

    1.8MB

    MD5

    498ee8e0a622a28f152d477ebf142d6e

    SHA1

    8dc76e53a1dab943ee04f74b60be5e993fc74dbe

    SHA256

    551a34381ee16c60338b979253f2e760e9025db180cf97b81fdb7cccbc5ab6fe

    SHA512

    6f0b51f0da103c2a445a13cf12d0c1c71060551bf5444434f88bef951a2cae91f93e7ae097bc92275cdf6f8eeb22beb965dd88e30a88ce9ec3cca3d4701a3820

  • C:\Program Files (x86)\Windows NT\f039239f.exe
    Filesize

    1.8MB

    MD5

    498ee8e0a622a28f152d477ebf142d6e

    SHA1

    8dc76e53a1dab943ee04f74b60be5e993fc74dbe

    SHA256

    551a34381ee16c60338b979253f2e760e9025db180cf97b81fdb7cccbc5ab6fe

    SHA512

    6f0b51f0da103c2a445a13cf12d0c1c71060551bf5444434f88bef951a2cae91f93e7ae097bc92275cdf6f8eeb22beb965dd88e30a88ce9ec3cca3d4701a3820

  • C:\Program Files (x86)\Windows NT\lic.rar
    Filesize

    66KB

    MD5

    bdfff1d8fde5586b3c70c59fafee3a44

    SHA1

    001338d1cf5da1dc49891e4dfd4fe0c54c7deeb5

    SHA256

    a895eb7de37d962e467b01d9d6d73d3dc40d48ab2fd5f70bf6802bf08f4c877f

    SHA512

    7f0b233de341ebb58fc9e6bc85f08aacda55893dc0f24f5fbe4adca80d8cf2690cc17f5f3709df631e17d43ddfb2faa9af677c72c3941165ede8513cb1a9acbc

  • C:\Users\Admin\AppData\Local\Temp\is-7NB41.tmp\Revo.Uninstaller.Pro.4.3.3.tmp
    Filesize

    1.2MB

    MD5

    d0bf64e27284709966a4e2efef3233ef

    SHA1

    f3d6c99e57ae9dda35fc24bbf4c1eb1e08a875f0

    SHA256

    2019350b1451f4653d27c33b1c034155ce81534f318cd2e3591dd2ee73c77f09

    SHA512

    4ef3c96a47327c6a061b3b71451018e83936670efd7eb17d60b5a834218ae39614d8c68cb2c0b31a423742a6d8e41eabcecea3e13d5fad728f8745bd9dc2984b

  • C:\Users\Admin\AppData\Local\Temp\is-EE618.tmp\2ed43f85bed23891c761f22ed421c005ba4551fb67d4355bcacd56a7270871c8.tmp
    Filesize

    2.5MB

    MD5

    cf332a6cc7a11f07445e5c83453b03dc

    SHA1

    69f4ff246361e4c601130b3d1419a6831d6af3b1

    SHA256

    4386798103acce7553b34c364f27e21e584e58afa6403702387813f6bae244b4

    SHA512

    a2b5ae8acda93c362d4d96f11c497647e7b6c06ed76663475006d4bacf0f15c7e7ec572241e8c528335f51dab49c64ec6aa085fb0144a29eb3fb9520a88e35f8

  • \Program Files (x86)\Microsoft KB64513\Revo.Uninstaller.Pro.4.3.3.exe
    Filesize

    16.1MB

    MD5

    1540ebe79933021c71b37d11ca590c6e

    SHA1

    5c3f54e29894d5d973e5a06d9b9cf53f723bcacf

    SHA256

    4c4258c10a1e7a0e7ab5529e68467cf23f5835621cff6dae204da456858d622a

    SHA512

    43ffc343ac95b52d62f2e918e8c5d7a65fd59a5f165643dbfadc4610b50d1460bdf561ab6ac0c02aa587abc0992acbaa2af6ef73f1b2ac75371d6d30292bb2d5

  • \Program Files (x86)\Windows NT\f039239f.exe
    Filesize

    1.8MB

    MD5

    498ee8e0a622a28f152d477ebf142d6e

    SHA1

    8dc76e53a1dab943ee04f74b60be5e993fc74dbe

    SHA256

    551a34381ee16c60338b979253f2e760e9025db180cf97b81fdb7cccbc5ab6fe

    SHA512

    6f0b51f0da103c2a445a13cf12d0c1c71060551bf5444434f88bef951a2cae91f93e7ae097bc92275cdf6f8eeb22beb965dd88e30a88ce9ec3cca3d4701a3820

  • \Users\Admin\AppData\Local\Temp\a6a0b8a6-4761-4357-9a31-0eca6ad70093\f.dll
    Filesize

    94KB

    MD5

    14ff402962ad21b78ae0b4c43cd1f194

    SHA1

    f8a510eb26666e875a5bdd1cadad40602763ad72

    SHA256

    fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b

    SHA512

    daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

  • \Users\Admin\AppData\Local\Temp\is-7NB41.tmp\Revo.Uninstaller.Pro.4.3.3.tmp
    Filesize

    1.2MB

    MD5

    d0bf64e27284709966a4e2efef3233ef

    SHA1

    f3d6c99e57ae9dda35fc24bbf4c1eb1e08a875f0

    SHA256

    2019350b1451f4653d27c33b1c034155ce81534f318cd2e3591dd2ee73c77f09

    SHA512

    4ef3c96a47327c6a061b3b71451018e83936670efd7eb17d60b5a834218ae39614d8c68cb2c0b31a423742a6d8e41eabcecea3e13d5fad728f8745bd9dc2984b

  • \Users\Admin\AppData\Local\Temp\is-EE618.tmp\2ed43f85bed23891c761f22ed421c005ba4551fb67d4355bcacd56a7270871c8.tmp
    Filesize

    2.5MB

    MD5

    cf332a6cc7a11f07445e5c83453b03dc

    SHA1

    69f4ff246361e4c601130b3d1419a6831d6af3b1

    SHA256

    4386798103acce7553b34c364f27e21e584e58afa6403702387813f6bae244b4

    SHA512

    a2b5ae8acda93c362d4d96f11c497647e7b6c06ed76663475006d4bacf0f15c7e7ec572241e8c528335f51dab49c64ec6aa085fb0144a29eb3fb9520a88e35f8

  • memory/952-88-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/952-66-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/952-63-0x0000000000000000-mapping.dmp
  • memory/1256-73-0x0000000000000000-mapping.dmp
  • memory/1316-77-0x0000000000000000-mapping.dmp
  • memory/1324-87-0x0000000074C30000-0x0000000074CB0000-memory.dmp
    Filesize

    512KB

  • memory/1324-70-0x0000000000000000-mapping.dmp
  • memory/1324-80-0x0000000000F50000-0x0000000001126000-memory.dmp
    Filesize

    1.8MB

  • memory/1324-89-0x0000000000B10000-0x0000000000B1C000-memory.dmp
    Filesize

    48KB

  • memory/1324-85-0x0000000000C70000-0x0000000000C9C000-memory.dmp
    Filesize

    176KB

  • memory/1700-81-0x0000000000000000-mapping.dmp
  • memory/1700-83-0x000007FEFC331000-0x000007FEFC333000-memory.dmp
    Filesize

    8KB

  • memory/1780-90-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB

  • memory/1780-100-0x000000000043FA93-mapping.dmp
  • memory/1780-105-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB

  • memory/1780-91-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB

  • memory/1780-93-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB

  • memory/1780-95-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB

  • memory/1780-97-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB

  • memory/1780-99-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB

  • memory/1780-104-0x0000000000400000-0x0000000000493000-memory.dmp
    Filesize

    588KB

  • memory/1960-61-0x0000000074D01000-0x0000000074D03000-memory.dmp
    Filesize

    8KB

  • memory/1960-58-0x0000000000000000-mapping.dmp
  • memory/1992-79-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1992-55-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1992-54-0x0000000075DB1000-0x0000000075DB3000-memory.dmp
    Filesize

    8KB