Analysis
-
max time kernel
95s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2022 06:47
Static task
static1
Behavioral task
behavioral1
Sample
a5f5f00fb8fa9f4403b5d666698a5a17.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a5f5f00fb8fa9f4403b5d666698a5a17.exe
Resource
win10v2004-20220812-en
General
-
Target
a5f5f00fb8fa9f4403b5d666698a5a17.exe
-
Size
1.3MB
-
MD5
a5f5f00fb8fa9f4403b5d666698a5a17
-
SHA1
9c39dd8abdc8ca70ddef39d66fa18d1ac43776a4
-
SHA256
d4227ec9dd2159223342099e0ed7d55c0691fe677ab2fc513c149a137e50ced8
-
SHA512
eb0aca212053059c78665d1cb81893ea5a704e153663be3f71bc5eafa48e43923bd5a0277c2c202ef84ade4eb5e15e75de2b4878af7fa89ef4ea7cb1030a9821
-
SSDEEP
12288:BnjoxXIB0nWZQzjFeM6DJOjB9sTTHyDErTTFyxhRz3Zws3OOiotlt1pXRW:AIqnYQb6VO3Er2hXt
Malware Config
Extracted
raccoon
0ec468673cadb705e7aab6a7b0bb3906
http://193.106.191.150/
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a5f5f00fb8fa9f4403b5d666698a5a17.exedescription pid process target process PID 2960 set thread context of 4968 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a5f5f00fb8fa9f4403b5d666698a5a17.exepid process 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a5f5f00fb8fa9f4403b5d666698a5a17.exedescription pid process Token: SeDebugPrivilege 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a5f5f00fb8fa9f4403b5d666698a5a17.exedescription pid process target process PID 2960 wrote to memory of 2272 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 2272 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 2272 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 4968 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 4968 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 4968 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 4968 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 4968 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 4968 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 4968 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 4968 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe PID 2960 wrote to memory of 4968 2960 a5f5f00fb8fa9f4403b5d666698a5a17.exe a5f5f00fb8fa9f4403b5d666698a5a17.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5f5f00fb8fa9f4403b5d666698a5a17.exe"C:\Users\Admin\AppData\Local\Temp\a5f5f00fb8fa9f4403b5d666698a5a17.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a5f5f00fb8fa9f4403b5d666698a5a17.exeC:\Users\Admin\AppData\Local\Temp\a5f5f00fb8fa9f4403b5d666698a5a17.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\a5f5f00fb8fa9f4403b5d666698a5a17.exeC:\Users\Admin\AppData\Local\Temp\a5f5f00fb8fa9f4403b5d666698a5a17.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2272-134-0x0000000000000000-mapping.dmp
-
memory/2960-132-0x0000000000610000-0x000000000076E000-memory.dmpFilesize
1.4MB
-
memory/2960-133-0x0000000005B10000-0x0000000005B32000-memory.dmpFilesize
136KB
-
memory/4968-135-0x0000000000000000-mapping.dmp
-
memory/4968-136-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4968-138-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4968-139-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB