Analysis

  • max time kernel
    133s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2022, 15:22

General

  • Target

    Drive.exe

  • Size

    291.2MB

  • MD5

    3934304fd91a95c31cbc1b7ba1ed39d5

  • SHA1

    0e66806bf3eaacc0f24b59bf39228b748adc5f35

  • SHA256

    c3513b234e4cbd4e3ba89a0aaabb1d81bf3cda4ebdd3d58a3b44f5a855a1299d

  • SHA512

    951ce5a4d2a52e2c2ab35f9f2012e7c5cd1ba74ef980d1f728b83e9a0f3ed82fecd15c10c6958f1cd8550e7cef0a3037c972bd385c4a8c4798895f7672c04757

  • SSDEEP

    24576:HrqZX7A/ugleH++mAxqY8qCyIL5w1l2Fgx8oJpW:H0A/ugleHLlxqoJIPA8D

Malware Config

Extracted

Family

raccoon

Botnet

24d4dabefbaffab7ce3f7f558b0190c1

C2

http://206.188.196.200/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Drive.exe
    "C:\Users\Admin\AppData\Local\Temp\Drive.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Users\Admin\AppData\Roaming\3Bt3piBG.exe
      "C:\Users\Admin\AppData\Roaming\3Bt3piBG.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Windows\system32\mode.com
          mode 65,10
          4⤵
            PID:4452
          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
            7z.exe e file.zip -p497399623207060581645911888 -oextracted
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:4948
          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
            7z.exe e extracted/file_3.zip -oextracted
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1840
          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
            7z.exe e extracted/file_2.zip -oextracted
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1976
          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
            7z.exe e extracted/file_1.zip -oextracted
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1388
          • C:\Windows\system32\attrib.exe
            attrib +H "hahbah.exe"
            4⤵
            • Views/modifies file attributes
            PID:1640
          • C:\Users\Admin\AppData\Local\Temp\main\hahbah.exe
            "hahbah.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:444
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C powershell -EncodedCommand "PAAjAFIAVQBiAEgAQgBZAHEAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBlADgAOQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBsAGUAOQBUAG8AVgBEAG8AaQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBwAHMAWgAjAD4A" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2896
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -EncodedCommand "PAAjAFIAVQBiAEgAQgBZAHEAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBlADgAOQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBsAGUAOQBUAG8AVgBEAG8AaQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBwAHMAWgAjAD4A"
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4196
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1656
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                6⤵
                • Creates scheduled task(s)
                PID:2716
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk9136" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4788
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk9136" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                6⤵
                • Creates scheduled task(s)
                PID:1504

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\mozglue.dll

            Filesize

            612KB

            MD5

            f07d9977430e762b563eaadc2b94bbfa

            SHA1

            da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

            SHA256

            4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

            SHA512

            6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

          • C:\Users\Admin\AppData\LocalLow\nss3.dll

            Filesize

            1.9MB

            MD5

            f67d08e8c02574cbc2f1122c53bfb976

            SHA1

            6522992957e7e4d074947cad63189f308a80fcf2

            SHA256

            c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

            SHA512

            2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

          • C:\Users\Admin\AppData\LocalLow\sqlite3.dll

            Filesize

            1.0MB

            MD5

            dbf4f8dcefb8056dc6bae4b67ff810ce

            SHA1

            bbac1dd8a07c6069415c04b62747d794736d0689

            SHA256

            47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

            SHA512

            b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

          • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

            Filesize

            1.6MB

            MD5

            72491c7b87a7c2dd350b727444f13bb4

            SHA1

            1e9338d56db7ded386878eab7bb44b8934ab1bc7

            SHA256

            34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

            SHA512

            583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

          • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

            Filesize

            1.6MB

            MD5

            72491c7b87a7c2dd350b727444f13bb4

            SHA1

            1e9338d56db7ded386878eab7bb44b8934ab1bc7

            SHA256

            34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

            SHA512

            583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

          • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

            Filesize

            1.6MB

            MD5

            72491c7b87a7c2dd350b727444f13bb4

            SHA1

            1e9338d56db7ded386878eab7bb44b8934ab1bc7

            SHA256

            34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

            SHA512

            583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

          • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

            Filesize

            1.6MB

            MD5

            72491c7b87a7c2dd350b727444f13bb4

            SHA1

            1e9338d56db7ded386878eab7bb44b8934ab1bc7

            SHA256

            34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

            SHA512

            583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

          • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

            Filesize

            1.6MB

            MD5

            72491c7b87a7c2dd350b727444f13bb4

            SHA1

            1e9338d56db7ded386878eab7bb44b8934ab1bc7

            SHA256

            34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

            SHA512

            583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

            Filesize

            458KB

            MD5

            619f7135621b50fd1900ff24aade1524

            SHA1

            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

            SHA256

            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

            SHA512

            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

            Filesize

            458KB

            MD5

            619f7135621b50fd1900ff24aade1524

            SHA1

            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

            SHA256

            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

            SHA512

            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

            Filesize

            458KB

            MD5

            619f7135621b50fd1900ff24aade1524

            SHA1

            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

            SHA256

            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

            SHA512

            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

            Filesize

            458KB

            MD5

            619f7135621b50fd1900ff24aade1524

            SHA1

            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

            SHA256

            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

            SHA512

            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

          • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

            Filesize

            2.1MB

            MD5

            e0f6d535997ab2edf1cbe69e0bca6cdb

            SHA1

            0cbddba627b652efcabaaf0d47a1384784bc49a1

            SHA256

            f2fc6792ad0778bd7e63022ee64bf6055e7b2f76952ea03fcbeafbfb90627896

            SHA512

            4dec93837de85b58d5de0098b18feea70e7260f6bff495c2410da0def5a55ad6cee73d9427d0105089eb537db353df10e141dd65b357604155dec95e4316141d

          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

            Filesize

            9KB

            MD5

            bf6434de6304f24e34b370aab0769a04

            SHA1

            40622b77e7f90285f169961242991dc05ff75b8b

            SHA256

            d27bd7353cbe626dabd64698d031e5299b7f34aba315e58c089fa98841dd2ed7

            SHA512

            f978aa1b41626e927c4f9340dce9203ed223e6c4c7428b228657d0631e100ac5eb397fd827b14fa17258a5d20223e8993c70a9c1d058122cfe0bd8d3dc9f5d3a

          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

            Filesize

            9KB

            MD5

            d7dc241a9a2d600e395f60f0130fccf3

            SHA1

            c0b4a838c79f1ea111cff268c8833f7c5c4f3323

            SHA256

            c1abbb797d4d1a35be67c34dac428438e710e78366cbfadb3214f2f18c88a1c8

            SHA512

            366aea6b264466840e264c57cb51a7786e8ff97d6a3005889f7e2a788e0b41b16893c9848f0bfc58eae56caf0771a711eaf419113f7357bed5772bcdf2a845ef

          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

            Filesize

            1.5MB

            MD5

            8bb130296b4bc2fb138cc1aa84b01d66

            SHA1

            22672a630751b3348b70bacc0c5ea09586b79597

            SHA256

            ebe135441705440f3be87161bec1b4150af6a77dd0f5574e6a09e52097d8d835

            SHA512

            60c553499118bc288a7b1ce21b409ce2a481d99eaa25f0c0f0f067cbb594b0496c7c8d0d6fa5c4959a555cbe6499302da19d67e276110d67ac0f3b1be2c4cb8d

          • C:\Users\Admin\AppData\Local\Temp\main\extracted\hahbah.exe

            Filesize

            21KB

            MD5

            f0d46ff3c120da0f2c9d1406c937b12f

            SHA1

            21b63d393d739ee013502e0bc976ff5b1ab10cf6

            SHA256

            3bbc6d72f7680f82ce7b109dc6c2b64305b1ea4228fd00586be1c161be8ab724

            SHA512

            1c9fdfe43eb136f20863f0c02c46a552c29236186cb06e761b4af113391f7605d0bb40d80490dd12419ce021938905845419bd12a8a6566d2dd767677eb61ff6

          • C:\Users\Admin\AppData\Local\Temp\main\file.bin

            Filesize

            1.5MB

            MD5

            9f15da5f78d36003b4d3339c2bbebb9f

            SHA1

            c93448bb358aeb7186b775cdc3f05cd46b0ec880

            SHA256

            ed70ad891f172fdf40fa3d8b34ef75355b123b7f2ec36d4caf56ab51fb373ff5

            SHA512

            d46d507b27826618c7717002c62c4e0817c11c69e20dac45b391916a2e915359f69804862452ff2deda45c836052a5ab5531f7cdd1a1f812555e9b43c01d0ad5

          • C:\Users\Admin\AppData\Local\Temp\main\hahbah.exe

            Filesize

            21KB

            MD5

            f0d46ff3c120da0f2c9d1406c937b12f

            SHA1

            21b63d393d739ee013502e0bc976ff5b1ab10cf6

            SHA256

            3bbc6d72f7680f82ce7b109dc6c2b64305b1ea4228fd00586be1c161be8ab724

            SHA512

            1c9fdfe43eb136f20863f0c02c46a552c29236186cb06e761b4af113391f7605d0bb40d80490dd12419ce021938905845419bd12a8a6566d2dd767677eb61ff6

          • C:\Users\Admin\AppData\Local\Temp\main\main.bat

            Filesize

            458B

            MD5

            dc301d9d812ef1d695fae27a5d6919fc

            SHA1

            96cf2ee80b19dbd6e452c6bf57e5d717bc4b7fc8

            SHA256

            bef69f1009d6d84c41cf3f7bdf50432d17b3e67253cd46c9defb35398a65c268

            SHA512

            6675f1cad24de3d6979bfcecfc88516f09c8b7739f8e5d9551bc7c113d4ab35867ce9f09b4202a6db64a26a1a16cd85ff3da244f03e7c250acd69d2f451c99be

          • C:\Users\Admin\AppData\Roaming\3Bt3piBG.exe

            Filesize

            2.6MB

            MD5

            d80afcd7d8398925c2764771797dbdb7

            SHA1

            5676fd75d728c8e9ba6a797fe8d0391449ae791b

            SHA256

            33824a5cb81283fffabf7a025a34bacf1c9fb40851b22b7b4be3554068f8691c

            SHA512

            83159c10d5b2ba978814637dabbcc38d72a6622c5240da64ac32fa48e6a3fb003fb2dcd09b2b8806a3ce7e7c53948344efb1477707834946e50498722c53bcde

          • C:\Users\Admin\AppData\Roaming\3Bt3piBG.exe

            Filesize

            2.6MB

            MD5

            d80afcd7d8398925c2764771797dbdb7

            SHA1

            5676fd75d728c8e9ba6a797fe8d0391449ae791b

            SHA256

            33824a5cb81283fffabf7a025a34bacf1c9fb40851b22b7b4be3554068f8691c

            SHA512

            83159c10d5b2ba978814637dabbcc38d72a6622c5240da64ac32fa48e6a3fb003fb2dcd09b2b8806a3ce7e7c53948344efb1477707834946e50498722c53bcde

          • memory/444-173-0x0000000005D10000-0x00000000062B4000-memory.dmp

            Filesize

            5.6MB

          • memory/444-176-0x0000000005AA0000-0x0000000005B06000-memory.dmp

            Filesize

            408KB

          • memory/444-175-0x00000000057F0000-0x00000000057FA000-memory.dmp

            Filesize

            40KB

          • memory/444-174-0x0000000005800000-0x0000000005892000-memory.dmp

            Filesize

            584KB

          • memory/444-172-0x0000000000E30000-0x0000000000E3C000-memory.dmp

            Filesize

            48KB

          • memory/3392-146-0x0000000000A50000-0x0000000000BC8000-memory.dmp

            Filesize

            1.5MB

          • memory/3392-133-0x0000000000A50000-0x0000000000BC8000-memory.dmp

            Filesize

            1.5MB

          • memory/3392-132-0x0000000000A50000-0x0000000000BC8000-memory.dmp

            Filesize

            1.5MB

          • memory/3392-134-0x0000000000A20000-0x0000000000A32000-memory.dmp

            Filesize

            72KB

          • memory/4196-183-0x0000000006660000-0x000000000667E000-memory.dmp

            Filesize

            120KB

          • memory/4196-192-0x0000000007980000-0x000000000799A000-memory.dmp

            Filesize

            104KB

          • memory/4196-181-0x0000000005EE0000-0x0000000005F02000-memory.dmp

            Filesize

            136KB

          • memory/4196-182-0x0000000006080000-0x00000000060E6000-memory.dmp

            Filesize

            408KB

          • memory/4196-179-0x0000000003180000-0x00000000031B6000-memory.dmp

            Filesize

            216KB

          • memory/4196-197-0x0000000007C20000-0x0000000007C28000-memory.dmp

            Filesize

            32KB

          • memory/4196-196-0x0000000007CE0000-0x0000000007CFA000-memory.dmp

            Filesize

            104KB

          • memory/4196-195-0x0000000007BD0000-0x0000000007BDE000-memory.dmp

            Filesize

            56KB

          • memory/4196-188-0x0000000006C40000-0x0000000006C72000-memory.dmp

            Filesize

            200KB

          • memory/4196-189-0x0000000070270000-0x00000000702BC000-memory.dmp

            Filesize

            304KB

          • memory/4196-190-0x0000000006C20000-0x0000000006C3E000-memory.dmp

            Filesize

            120KB

          • memory/4196-191-0x0000000007FC0000-0x000000000863A000-memory.dmp

            Filesize

            6.5MB

          • memory/4196-180-0x0000000005880000-0x0000000005EA8000-memory.dmp

            Filesize

            6.2MB

          • memory/4196-193-0x0000000007A10000-0x0000000007A1A000-memory.dmp

            Filesize

            40KB

          • memory/4196-194-0x0000000007C40000-0x0000000007CD6000-memory.dmp

            Filesize

            600KB