Analysis
-
max time kernel
53s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/10/2022, 17:26
Static task
static1
Behavioral task
behavioral1
Sample
4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe
Resource
win10-20220812-en
General
-
Target
4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe
-
Size
220KB
-
MD5
7e0ca4c3e31519b2b599f40081cf5f12
-
SHA1
cdc02bb8f8752e827dfe84befddcbdd4696cd296
-
SHA256
4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563
-
SHA512
f249f30dae52bae904572b331cb96d39983e9c15778c1f07d7374f2eeabc8667f65b4d0f8cbf6c3c623b9e114df90fd479c6dee64ccee419de7529f3678e9000
-
SSDEEP
3072:tXpQbHChLT8QwarMG57rwHlfrHXV1522dWzJnyGS0Ku7HzEi2N27:paHChLLrMJrHXV+ryGS0362
Malware Config
Extracted
raccoon
63267bc2317b9849c2d512a4e16b0f3b
http://shettester1000.com/
Signatures
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4152 set thread context of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4152 wrote to memory of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67 PID 4152 wrote to memory of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67 PID 4152 wrote to memory of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67 PID 4152 wrote to memory of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67 PID 4152 wrote to memory of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67 PID 4152 wrote to memory of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67 PID 4152 wrote to memory of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67 PID 4152 wrote to memory of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67 PID 4152 wrote to memory of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67 PID 4152 wrote to memory of 2364 4152 4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe"C:\Users\Admin\AppData\Local\Temp\4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe"C:\Users\Admin\AppData\Local\Temp\4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563.exe"2⤵PID:2364
-