Analysis
-
max time kernel
55s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-06-2022 03:19
Static task
static1
Behavioral task
behavioral1
Sample
99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4.exe
Resource
win10-20220414-en
General
-
Target
99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4.exe
-
Size
7.4MB
-
MD5
22d27186a79cfc261d19611645c0c4f1
-
SHA1
a87f22dba40c522889764dfb1aeafe2096d929d3
-
SHA256
99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4
-
SHA512
a93dff567253395f7073b49c319f5b6fefed34f6a1e0907280baf2623d6dd4ba8f1eee407620480c3a568340e6b964cad1e3e8d38c57ac4118c9d2343f05225c
Malware Config
Signatures
-
Raccoon ver2 3 IoCs
Raccoon ver2.
Processes:
resource yara_rule behavioral1/memory/1380-54-0x0000000000130000-0x0000000000896000-memory.dmp raccoon_v2 behavioral1/memory/1380-56-0x0000000000130000-0x0000000000896000-memory.dmp raccoon_v2 behavioral1/memory/1380-57-0x0000000000130000-0x0000000000896000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4.exepid Process 1380 99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4.exe 1380 99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4.exepid Process 1380 99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4.exe"C:\Users\Admin\AppData\Local\Temp\99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1380