Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 23:47

General

  • Target

    43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe

  • Size

    1.6MB

  • MD5

    c8bee82b1d76257b8977b3f373827100

  • SHA1

    60535191909cefb0932e1ab71c42a05ecff3f84f

  • SHA256

    43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112

  • SHA512

    bd3e786a9728fe145ca6bfba5802473be1a5c60f2691d48e39c8d4f33023f06c154ada1778cc495d4d292c28dcc908eb9114239ccfc39c2573d7d53a8b43f0be

Malware Config

Extracted

Family

raccoon

Botnet

e5a98a0423e8a05c07c85512b1c0eb7a8fff35a1

Attributes
  • url4cnc

    https://telete.in/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

oski

C2

pabloq.ug

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe
    "C:\Users\Admin\AppData\Local\Temp\43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Ohwrvu.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\Lime_az.exe
        "C:\Users\Admin\AppData\Local\Temp\Lime_az.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1292
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Ckrbrl.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1848
          • C:\Users\Admin\AppData\Local\Temp\Lime_os.exe
            "C:\Users\Admin\AppData\Local\Temp\Lime_os.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1272
            • C:\Users\Admin\AppData\Local\Temp\Lime_os.exe
              "C:\Users\Admin\AppData\Local\Temp\Lime_os.exe"
              6⤵
              • Executes dropped EXE
              PID:1648
            • C:\Users\Admin\AppData\Local\Temp\Lime_os.exe
              "C:\Users\Admin\AppData\Local\Temp\Lime_os.exe"
              6⤵
              • Executes dropped EXE
              PID:320
        • C:\Users\Admin\AppData\Local\Temp\Lime_az.exe
          "C:\Users\Admin\AppData\Local\Temp\Lime_az.exe"
          4⤵
          • Executes dropped EXE
          PID:1760
    • C:\Users\Admin\AppData\Local\Temp\43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe
      "C:\Users\Admin\AppData\Local\Temp\43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe"
      2⤵
        PID:1040

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Ckrbrl.vbs
      Filesize

      95B

      MD5

      3550c103bad5b787e0ffeae513b57daa

      SHA1

      dcb236be3035555c6fcb077aa82f583c2559c46b

      SHA256

      b2218f291548cbcfceb39563f47384e83a647f0e2eda8ad1f7c2c4909817008e

      SHA512

      e02641998aca9b90caf29f3f357c6eeb77dc6831e029fe434b0e68c9aaa58775123496af0e6964d5139014fbeba3c0ca5c778e9ef1b01c5901019c8edc56d6ee

    • C:\Users\Admin\AppData\Local\Temp\Lime_az.exe
      Filesize

      1022KB

      MD5

      0c9dbc9a459190bdbbea8740d1a7c003

      SHA1

      7f94768946e359d5f5f5dabfa6c3e23d0aca05c4

      SHA256

      794a69405d4e0f876bed7975a4969cae18a49eb1faa18065642f1ff348b53ad7

      SHA512

      667452032bd9fdc6b872efaf5149ac379ca0f42d9fbf13e69f3e0817f22906b820e1f6ca65f61c1b882de17f40791f1f54fbb2435c0281a0fd0b84685e59e8f4

    • C:\Users\Admin\AppData\Local\Temp\Lime_az.exe
      Filesize

      1022KB

      MD5

      0c9dbc9a459190bdbbea8740d1a7c003

      SHA1

      7f94768946e359d5f5f5dabfa6c3e23d0aca05c4

      SHA256

      794a69405d4e0f876bed7975a4969cae18a49eb1faa18065642f1ff348b53ad7

      SHA512

      667452032bd9fdc6b872efaf5149ac379ca0f42d9fbf13e69f3e0817f22906b820e1f6ca65f61c1b882de17f40791f1f54fbb2435c0281a0fd0b84685e59e8f4

    • C:\Users\Admin\AppData\Local\Temp\Lime_az.exe
      Filesize

      1022KB

      MD5

      0c9dbc9a459190bdbbea8740d1a7c003

      SHA1

      7f94768946e359d5f5f5dabfa6c3e23d0aca05c4

      SHA256

      794a69405d4e0f876bed7975a4969cae18a49eb1faa18065642f1ff348b53ad7

      SHA512

      667452032bd9fdc6b872efaf5149ac379ca0f42d9fbf13e69f3e0817f22906b820e1f6ca65f61c1b882de17f40791f1f54fbb2435c0281a0fd0b84685e59e8f4

    • C:\Users\Admin\AppData\Local\Temp\Lime_os.exe
      Filesize

      614KB

      MD5

      49e8a4630cef01ce6e9044c79f0b4df9

      SHA1

      3cef9a06f4a19be528626f0a7d98c94950ced9db

      SHA256

      9157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb

      SHA512

      a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0

    • C:\Users\Admin\AppData\Local\Temp\Lime_os.exe
      Filesize

      614KB

      MD5

      49e8a4630cef01ce6e9044c79f0b4df9

      SHA1

      3cef9a06f4a19be528626f0a7d98c94950ced9db

      SHA256

      9157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb

      SHA512

      a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0

    • C:\Users\Admin\AppData\Local\Temp\Lime_os.exe
      Filesize

      614KB

      MD5

      49e8a4630cef01ce6e9044c79f0b4df9

      SHA1

      3cef9a06f4a19be528626f0a7d98c94950ced9db

      SHA256

      9157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb

      SHA512

      a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0

    • C:\Users\Admin\AppData\Local\Temp\Lime_os.exe
      Filesize

      614KB

      MD5

      49e8a4630cef01ce6e9044c79f0b4df9

      SHA1

      3cef9a06f4a19be528626f0a7d98c94950ced9db

      SHA256

      9157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb

      SHA512

      a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0

    • C:\Users\Admin\AppData\Local\Temp\Ohwrvu.vbs
      Filesize

      95B

      MD5

      c7424fe30a1afff4d1bb201834feabfd

      SHA1

      7cc755d4d900645df7ed19d1da87fb4048e647af

      SHA256

      9b6b55e7ce08eb22cf38a86953897b49559c43752f398d90038771a6d006080b

      SHA512

      51fcdb3932f13daabff50bdb5a20d6aa0a18057cc296cfe80ff3e468403f8690dfc2b454265beba0126cf6f08cc2961161405d33e0f7c3159754f0ae0865632c

    • \Users\Admin\AppData\Local\Temp\Lime_az.exe
      Filesize

      1022KB

      MD5

      0c9dbc9a459190bdbbea8740d1a7c003

      SHA1

      7f94768946e359d5f5f5dabfa6c3e23d0aca05c4

      SHA256

      794a69405d4e0f876bed7975a4969cae18a49eb1faa18065642f1ff348b53ad7

      SHA512

      667452032bd9fdc6b872efaf5149ac379ca0f42d9fbf13e69f3e0817f22906b820e1f6ca65f61c1b882de17f40791f1f54fbb2435c0281a0fd0b84685e59e8f4

    • \Users\Admin\AppData\Local\Temp\Lime_az.exe
      Filesize

      1022KB

      MD5

      0c9dbc9a459190bdbbea8740d1a7c003

      SHA1

      7f94768946e359d5f5f5dabfa6c3e23d0aca05c4

      SHA256

      794a69405d4e0f876bed7975a4969cae18a49eb1faa18065642f1ff348b53ad7

      SHA512

      667452032bd9fdc6b872efaf5149ac379ca0f42d9fbf13e69f3e0817f22906b820e1f6ca65f61c1b882de17f40791f1f54fbb2435c0281a0fd0b84685e59e8f4

    • \Users\Admin\AppData\Local\Temp\Lime_os.exe
      Filesize

      614KB

      MD5

      49e8a4630cef01ce6e9044c79f0b4df9

      SHA1

      3cef9a06f4a19be528626f0a7d98c94950ced9db

      SHA256

      9157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb

      SHA512

      a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0

    • \Users\Admin\AppData\Local\Temp\Lime_os.exe
      Filesize

      614KB

      MD5

      49e8a4630cef01ce6e9044c79f0b4df9

      SHA1

      3cef9a06f4a19be528626f0a7d98c94950ced9db

      SHA256

      9157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb

      SHA512

      a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0

    • \Users\Admin\AppData\Local\Temp\Lime_os.exe
      Filesize

      614KB

      MD5

      49e8a4630cef01ce6e9044c79f0b4df9

      SHA1

      3cef9a06f4a19be528626f0a7d98c94950ced9db

      SHA256

      9157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb

      SHA512

      a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0

    • memory/320-125-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/320-113-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/320-123-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/320-115-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/320-110-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/320-120-0x0000000000417A8B-mapping.dmp
    • memory/320-111-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/320-119-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/320-117-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/1040-60-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB

    • memory/1040-62-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB

    • memory/1040-68-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB

    • memory/1040-58-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB

    • memory/1040-80-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB

    • memory/1040-66-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB

    • memory/1040-73-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB

    • memory/1040-64-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB

    • memory/1040-69-0x000000000043FA93-mapping.dmp
    • memory/1272-102-0x0000000000FF0000-0x0000000001090000-memory.dmp
      Filesize

      640KB

    • memory/1272-94-0x0000000000000000-mapping.dmp
    • memory/1272-106-0x0000000000C80000-0x0000000000CD6000-memory.dmp
      Filesize

      344KB

    • memory/1292-81-0x0000000005110000-0x00000000051DA000-memory.dmp
      Filesize

      808KB

    • memory/1292-78-0x0000000001080000-0x0000000001186000-memory.dmp
      Filesize

      1.0MB

    • memory/1292-76-0x0000000000000000-mapping.dmp
    • memory/1760-92-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1760-105-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1760-89-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1760-93-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1760-96-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1760-101-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1760-97-0x000000000041A684-mapping.dmp
    • memory/1760-86-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1760-85-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1760-126-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1848-82-0x0000000000000000-mapping.dmp
    • memory/1856-55-0x0000000075CE1000-0x0000000075CE3000-memory.dmp
      Filesize

      8KB

    • memory/1856-56-0x00000000060B0000-0x000000000621E000-memory.dmp
      Filesize

      1.4MB

    • memory/1856-54-0x0000000000E10000-0x0000000000FBA000-memory.dmp
      Filesize

      1.7MB

    • memory/2020-57-0x0000000000000000-mapping.dmp