Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/11/2022, 14:33

221102-rw3mdscagq 1

26/10/2022, 07:23

221026-h784wafac4 10

05/10/2022, 12:44

221005-pygrlaecg4 10

Analysis

  • max time kernel
    114s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/10/2022, 07:23

General

  • Target

    ac.zip

  • Size

    6.5MB

  • MD5

    154828a4f27af8eecef488d47ea88a82

  • SHA1

    f09d86eb70a0663c86a6574e7fe37abad416a779

  • SHA256

    ebec7e22109660526ff989561557d6193a2a5f42e3c798ef9144ef5d87cf22c0

  • SHA512

    5cab345b1b2a0c6cb79dca33da248bd36383b9f1842351878f26ff28dbcb9291da3d3461de2e6aa4bece306633271cf4313d3e37172567b428e5202c3604562d

  • SSDEEP

    98304:alWsutAz0Ipf8hmzq3oyIKdb/WsTWwn/0jWc1T3bQAlWDF0vOs8CLtY3S0y:ak/WS4UoypF+3wslbOSYq

Malware Config

Extracted

Family

raccoon

Botnet

4346e67ff7008df6f26a01502c3596ac

C2

http://94.131.98.5/

http://94.131.97.129

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\ac.zip
    1⤵
      PID:1044
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:860
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x1f4
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:596
      • C:\Users\Admin\Documents\ac\Setup.exe
        "C:\Users\Admin\Documents\ac\Setup.exe"
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1616

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/860-54-0x000007FEFB821000-0x000007FEFB823000-memory.dmp

        Filesize

        8KB

      • memory/1616-55-0x0000000075071000-0x0000000075073000-memory.dmp

        Filesize

        8KB

      • memory/1616-56-0x00000000013C0000-0x0000000001EBB000-memory.dmp

        Filesize

        11.0MB

      • memory/1616-59-0x00000000013C0000-0x0000000001EBB000-memory.dmp

        Filesize

        11.0MB