Analysis
-
max time kernel
51s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
17-10-2022 21:21
Static task
static1
Behavioral task
behavioral1
Sample
941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exe
Resource
win10-20220901-en
General
-
Target
941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exe
-
Size
2.5MB
-
MD5
76db228d61022f20ae62d751b4c163ba
-
SHA1
8d72ad5482f7164441ffe8f90ab79557784c878c
-
SHA256
941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf
-
SHA512
daba86863fc8f1ed975f233bc4cd934d609e7ef854eb57165c67e163421cdc50f7b059063bbf5bee0a0528c7b273320932e8ce76bd59d7fd53f0e4dd7528e9e2
-
SSDEEP
24576:vmw4MA8/R3BL7o+w0Y1Yj002XLMw96KZd2B8Z0b5bpD6cvI/H/313LaXC79lyulD:v7AAnL7o+awbfI/H/313moHl3z
Malware Config
Extracted
raccoon
ce21570f8b07f4e68bfb7f44917635b1
http://77.73.133.7/
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
Processes:
vbc.exepid process 99468 vbc.exe 99468 vbc.exe 99468 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exedescription pid process target process PID 4544 set thread context of 99468 4544 941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exe vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exedescription pid process target process PID 4544 wrote to memory of 99468 4544 941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exe vbc.exe PID 4544 wrote to memory of 99468 4544 941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exe vbc.exe PID 4544 wrote to memory of 99468 4544 941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exe vbc.exe PID 4544 wrote to memory of 99468 4544 941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exe vbc.exe PID 4544 wrote to memory of 99468 4544 941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exe"C:\Users\Admin\AppData\Local\Temp\941d659ae7dea2fd5c1aa4b09cb9516a502b5c6c1d503efe6b6328801176cdbf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
memory/4544-120-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-121-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-122-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-123-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-124-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-125-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-126-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-127-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-128-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-129-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-130-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-131-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-132-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-133-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-135-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/4544-134-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-136-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/99468-143-0x0000000000408597-mapping.dmp
-
memory/99468-144-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-145-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-146-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-147-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-148-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-149-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-150-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-151-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-152-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-153-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-154-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-155-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-156-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-157-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-158-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-159-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-160-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-161-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/99468-162-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-163-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-164-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-165-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-166-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-167-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-168-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-169-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-170-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-171-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-172-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-173-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-174-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-175-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-176-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-177-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-178-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-179-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-180-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-181-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-182-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-183-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB
-
memory/99468-184-0x0000000077340000-0x00000000774CE000-memory.dmpFilesize
1.6MB