Analysis
-
max time kernel
53s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
16-10-2022 16:03
Static task
static1
Behavioral task
behavioral1
Sample
ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe
Resource
win10-20220901-en
General
-
Target
ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe
-
Size
213KB
-
MD5
4985af8c670ddde8fa978c82e8e6ed3e
-
SHA1
9e4b7558b5e69d2f0428b0728ceafd99afc95dcb
-
SHA256
ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274
-
SHA512
6ae4a4f32b1b48eee22c56a2c5cc2e1b1b069531993929908961ba4d0ab087dca0089395d4bf0f33665dda094fbdef5b4eee7fc4fd16faa73e01f4d5890556a3
-
SSDEEP
3072:cXpRHuHtLitAIpPw57XefTsjKtXo/me9+Ockt27t0Kg1Ok:YHuHtLoPeIgqe9+OFot0Ok
Malware Config
Extracted
raccoon
63267bc2317b9849c2d512a4e16b0f3b
http://shettester1000.com/
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
pid Process 3268 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66 PID 2672 wrote to memory of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66 PID 2672 wrote to memory of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66 PID 2672 wrote to memory of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66 PID 2672 wrote to memory of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66 PID 2672 wrote to memory of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66 PID 2672 wrote to memory of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66 PID 2672 wrote to memory of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66 PID 2672 wrote to memory of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66 PID 2672 wrote to memory of 3268 2672 ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe"C:\Users\Admin\AppData\Local\Temp\ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe"C:\Users\Admin\AppData\Local\Temp\ff0f5c06e13d7f3038de3ba92aa5ac178368e5092763fd04b27867a323d1d274.exe"2⤵
- Loads dropped DLL
PID:3268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5