Analysis
-
max time kernel
307s -
max time network
347s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-06-2022 03:44
Static task
static1
Behavioral task
behavioral1
Sample
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe
Resource
win10-20220414-en
windows10_x64
0 signatures
0 seconds
General
-
Target
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe
-
Size
7.4MB
-
MD5
7ecdf36bd30c2d9653ea31b6baf32910
-
SHA1
b1d6c01c397924f2324091261bb4f29156a58f0a
-
SHA256
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0
-
SHA512
1c3402096ab086239e39931c1587ab7c31172faf6307aad396683e0ea7ec6df24f7dbc1b2307fa099fe5d66c592864563217aced68bb9a106978d8b1086b2c88
Score
10/10
Malware Config
Signatures
-
Raccoon ver2 3 IoCs
Raccoon ver2.
Processes:
resource yara_rule behavioral1/memory/1772-54-0x0000000000FF0000-0x0000000001B70000-memory.dmp raccoon_v2 behavioral1/memory/1772-57-0x0000000000FF0000-0x0000000001B70000-memory.dmp raccoon_v2 behavioral1/memory/1772-58-0x0000000000FF0000-0x0000000001B70000-memory.dmp raccoon_v2 -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exepid Process 1772 6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe 1772 6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exepid Process 1772 6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe"C:\Users\Admin\AppData\Local\Temp\6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1772