Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
10-06-2022 20:24
Static task
static1
General
-
Target
056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe
-
Size
4.5MB
-
MD5
8b816302b43bc9e9b6ac2c694459a420
-
SHA1
d52fc1485c86843bd3e4166ebc1ef4f9a1732579
-
SHA256
056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa
-
SHA512
a7e429e911af551af026f3a18d5845d1d032d5dbd39af17fec94917368c971682742791adff212c3d36e52d0c682a87a5c5262fc2019690e5f07b259738bac5c
Malware Config
Extracted
raccoon
2e76ef3db69c0aaf1af8319ea2bd6e91
http://185.106.94.148/
Signatures
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Possible Drive DDoS Check-in
suricata: ET MALWARE Possible Drive DDoS Check-in
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
3604.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3604.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
3604.exe3B06.exedj.exepid Process 1852 3604.exe 1244 3B06.exe 516 dj.exe -
Processes:
resource yara_rule behavioral1/memory/424-126-0x0000000000400000-0x0000000000B6D000-memory.dmp vmprotect behavioral1/memory/424-134-0x0000000000400000-0x0000000000B6D000-memory.dmp vmprotect behavioral1/memory/424-147-0x0000000000400000-0x0000000000B6D000-memory.dmp vmprotect behavioral1/memory/424-151-0x0000000000400000-0x0000000000B6D000-memory.dmp vmprotect behavioral1/files/0x000800000001ac12-153.dat vmprotect behavioral1/files/0x000800000001ac12-160.dat vmprotect behavioral1/memory/1852-167-0x0000000001230000-0x0000000001C80000-memory.dmp vmprotect behavioral1/memory/1852-546-0x0000000001230000-0x0000000001C80000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3604.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3604.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3604.exe -
Deletes itself 1 IoCs
Processes:
pid Process 2060 -
Processes:
resource yara_rule behavioral1/files/0x000800000001ac12-153.dat themida behavioral1/files/0x000800000001ac12-160.dat themida behavioral1/memory/1852-167-0x0000000001230000-0x0000000001C80000-memory.dmp themida behavioral1/memory/1852-546-0x0000000001230000-0x0000000001C80000-memory.dmp themida -
Processes:
3604.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3604.exe -
Drops file in System32 directory 1 IoCs
Processes:
dj.exedescription ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\ffifssssfdfsf4f.ini dj.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
3604.exepid Process 1852 3604.exe -
Drops file in Windows directory 2 IoCs
Processes:
3B06.exedescription ioc Process File created C:\Windows\dj.exe 3B06.exe File opened for modification C:\Windows\dj.exe 3B06.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exepid Process 424 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe 424 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe 424 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe 424 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe 424 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe 424 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 2060 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exepid Process 424 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
description pid Process procid_target PID 2060 wrote to memory of 1852 2060 66 PID 2060 wrote to memory of 1852 2060 66 PID 2060 wrote to memory of 1852 2060 66 PID 2060 wrote to memory of 1244 2060 67 PID 2060 wrote to memory of 1244 2060 67 PID 2060 wrote to memory of 1244 2060 67 PID 2060 wrote to memory of 2288 2060 68 PID 2060 wrote to memory of 2288 2060 68 PID 2060 wrote to memory of 2288 2060 68 PID 2060 wrote to memory of 2288 2060 68 PID 2060 wrote to memory of 3936 2060 69 PID 2060 wrote to memory of 3936 2060 69 PID 2060 wrote to memory of 3936 2060 69 PID 2060 wrote to memory of 3552 2060 70 PID 2060 wrote to memory of 3552 2060 70 PID 2060 wrote to memory of 3552 2060 70 PID 2060 wrote to memory of 3552 2060 70 PID 2060 wrote to memory of 3232 2060 72 PID 2060 wrote to memory of 3232 2060 72 PID 2060 wrote to memory of 3232 2060 72 PID 2060 wrote to memory of 3656 2060 73 PID 2060 wrote to memory of 3656 2060 73 PID 2060 wrote to memory of 3656 2060 73 PID 2060 wrote to memory of 3656 2060 73 PID 2060 wrote to memory of 1764 2060 74 PID 2060 wrote to memory of 1764 2060 74 PID 2060 wrote to memory of 1764 2060 74 PID 2060 wrote to memory of 1764 2060 74 PID 2060 wrote to memory of 584 2060 75 PID 2060 wrote to memory of 584 2060 75 PID 2060 wrote to memory of 584 2060 75 PID 2060 wrote to memory of 584 2060 75 PID 2060 wrote to memory of 2320 2060 76 PID 2060 wrote to memory of 2320 2060 76 PID 2060 wrote to memory of 2320 2060 76 PID 2060 wrote to memory of 2756 2060 77 PID 2060 wrote to memory of 2756 2060 77 PID 2060 wrote to memory of 2756 2060 77 PID 2060 wrote to memory of 2756 2060 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe"C:\Users\Admin\AppData\Local\Temp\056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:424
-
C:\Users\Admin\AppData\Local\Temp\3604.exeC:\Users\Admin\AppData\Local\Temp\3604.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1852
-
C:\Users\Admin\AppData\Local\Temp\3B06.exeC:\Users\Admin\AppData\Local\Temp\3B06.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1244
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2288
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3936
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3552
-
C:\Windows\dj.exeC:\Windows\dj.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:516
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3232
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3656
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1764
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:584
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2320
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD5ad4bc9bb3745fda3691939c1e8cd6e1d
SHA1d611d64128700f832b9d2fb3f82c13fd14284d68
SHA256a2aa3a54764571120a806a122f914b0653ff281942dc640213b2068be1d912be
SHA512abf9b9822583bfb65cb9c00a500afd5848a21b3b08d94010fcf7f688d2ace9a2fc5065446e2d9c54276d39e63b61887085063bda28a2e3d359efba09c09b547d
-
Filesize
4.5MB
MD5ad4bc9bb3745fda3691939c1e8cd6e1d
SHA1d611d64128700f832b9d2fb3f82c13fd14284d68
SHA256a2aa3a54764571120a806a122f914b0653ff281942dc640213b2068be1d912be
SHA512abf9b9822583bfb65cb9c00a500afd5848a21b3b08d94010fcf7f688d2ace9a2fc5065446e2d9c54276d39e63b61887085063bda28a2e3d359efba09c09b547d
-
Filesize
37KB
MD59ab28e7a07bcd4daadb205512c448885
SHA154b27af95a7e537b697ecd5c84d5667aead078fd
SHA256943dae729918b001cb1905ec16c8a541a549e748bf5be02269bbb64205eac570
SHA51266cec35989a09727151879efb60282418f48338ff50494e1858236ffafd4e0f27c23dde5fecb5590ac903954d66ff2a497b229cf45b9c60d8f73bd499c093f35
-
Filesize
37KB
MD59ab28e7a07bcd4daadb205512c448885
SHA154b27af95a7e537b697ecd5c84d5667aead078fd
SHA256943dae729918b001cb1905ec16c8a541a549e748bf5be02269bbb64205eac570
SHA51266cec35989a09727151879efb60282418f48338ff50494e1858236ffafd4e0f27c23dde5fecb5590ac903954d66ff2a497b229cf45b9c60d8f73bd499c093f35
-
Filesize
37KB
MD59ab28e7a07bcd4daadb205512c448885
SHA154b27af95a7e537b697ecd5c84d5667aead078fd
SHA256943dae729918b001cb1905ec16c8a541a549e748bf5be02269bbb64205eac570
SHA51266cec35989a09727151879efb60282418f48338ff50494e1858236ffafd4e0f27c23dde5fecb5590ac903954d66ff2a497b229cf45b9c60d8f73bd499c093f35
-
Filesize
37KB
MD59ab28e7a07bcd4daadb205512c448885
SHA154b27af95a7e537b697ecd5c84d5667aead078fd
SHA256943dae729918b001cb1905ec16c8a541a549e748bf5be02269bbb64205eac570
SHA51266cec35989a09727151879efb60282418f48338ff50494e1858236ffafd4e0f27c23dde5fecb5590ac903954d66ff2a497b229cf45b9c60d8f73bd499c093f35