Analysis

  • max time kernel
    68s
  • max time network
    61s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2022 10:21

General

  • Target

    c09d01c8ff1a471a1176b37e68b26c6a63e7487fdb8642de6ee180dd3da8910e.exe

  • Size

    7.7MB

  • MD5

    ad893d62c825d311c4733b65c788b818

  • SHA1

    d17bd768266007566a59b1c14ef6f4c9f30a4ff3

  • SHA256

    c09d01c8ff1a471a1176b37e68b26c6a63e7487fdb8642de6ee180dd3da8910e

  • SHA512

    841f80bcac2d7acff44a78a9a9092e2e750586ef1d054bb58aa1c03fd32a371415c1f52f01c3256db03a6e671a49f00c3bbe5214577bc7fc4f7b31ea68dab6c8

  • SSDEEP

    196608:udSRf50/fy7TaoGo2QGya4lbC7t+5mkWHA1jZBsIkPnp:5xayV529ya41C7tFaZTI

Malware Config

Extracted

Family

raccoon

Botnet

30983d9f29580bfa36d11934e219e205

C2

http://176.124.218.249/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c09d01c8ff1a471a1176b37e68b26c6a63e7487fdb8642de6ee180dd3da8910e.exe
    "C:\Users\Admin\AppData\Local\Temp\c09d01c8ff1a471a1176b37e68b26c6a63e7487fdb8642de6ee180dd3da8910e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
        PID:1032

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1032-66-0x0000000000400000-0x0000000000414000-memory.dmp
      Filesize

      80KB

    • memory/1032-72-0x0000000000400000-0x0000000000414000-memory.dmp
      Filesize

      80KB

    • memory/1032-64-0x0000000000400000-0x0000000000414000-memory.dmp
      Filesize

      80KB

    • memory/1032-69-0x0000000000400000-0x0000000000414000-memory.dmp
      Filesize

      80KB

    • memory/1520-58-0x0000000002F80000-0x0000000003657000-memory.dmp
      Filesize

      6.8MB

    • memory/1520-60-0x0000000074D61000-0x0000000074D63000-memory.dmp
      Filesize

      8KB

    • memory/1520-61-0x000000000D860000-0x000000000D95D000-memory.dmp
      Filesize

      1012KB

    • memory/1520-62-0x0000000002DA0000-0x0000000002EFC000-memory.dmp
      Filesize

      1.4MB

    • memory/1520-63-0x000000000D860000-0x000000000D95D000-memory.dmp
      Filesize

      1012KB

    • memory/1520-59-0x0000000002DA0000-0x0000000002EFC000-memory.dmp
      Filesize

      1.4MB

    • memory/1520-68-0x0000000000B20000-0x000000000180D000-memory.dmp
      Filesize

      12.9MB

    • memory/1520-54-0x0000000000B20000-0x000000000180D000-memory.dmp
      Filesize

      12.9MB

    • memory/1520-71-0x0000000002DA0000-0x0000000002EFC000-memory.dmp
      Filesize

      1.4MB

    • memory/1520-57-0x0000000002F80000-0x0000000003657000-memory.dmp
      Filesize

      6.8MB

    • memory/1520-56-0x0000000000B20000-0x000000000180D000-memory.dmp
      Filesize

      12.9MB