Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 22:16
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
file.exe
-
Size
3.9MB
-
MD5
64b30e9465580bc5af03f01e930e04b3
-
SHA1
727f463e282cc19e4a55b96dd05c60d4bc8b460a
-
SHA256
5a3544515807da069035c75e37e1570b893768eeab16385402b0464fd26272c0
-
SHA512
d846ba776ff4ccfea1ab9f812266736d814b158731a0ec6e542c9d791d43714ff376f0746aad9257a60bc68b8b4a33f204763b5ba8cd5d4d988af504c9cea81c
-
SSDEEP
98304:6PgeUa+s1ybDLoAu4xe8qm8jttGnwSYWqwO0+ny+UEq:6PcQynL3uuq3RtGCwO0wysq
Score
10/10
Malware Config
Extracted
Family
raccoon
Botnet
9b19cf60d9bdf65b8a2495aa965456c3
C2
http://94.131.107.206
rc4.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 5068 set thread context of 3896 5068 file.exe jsc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 5068 file.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
file.exedescription pid process target process PID 5068 wrote to memory of 3896 5068 file.exe jsc.exe PID 5068 wrote to memory of 3896 5068 file.exe jsc.exe PID 5068 wrote to memory of 3896 5068 file.exe jsc.exe PID 5068 wrote to memory of 3896 5068 file.exe jsc.exe PID 5068 wrote to memory of 3896 5068 file.exe jsc.exe PID 5068 wrote to memory of 3896 5068 file.exe jsc.exe PID 5068 wrote to memory of 3896 5068 file.exe jsc.exe PID 5068 wrote to memory of 3896 5068 file.exe jsc.exe PID 5068 wrote to memory of 3896 5068 file.exe jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\jsc.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3896-137-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3896-138-0x0000000000408597-mapping.dmp
-
memory/3896-140-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3896-142-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/5068-132-0x00000000006C0000-0x0000000000AB6000-memory.dmpFilesize
4.0MB
-
memory/5068-133-0x00007FFCC3A60000-0x00007FFCC4521000-memory.dmpFilesize
10.8MB
-
memory/5068-134-0x00007FFCC3A60000-0x00007FFCC4521000-memory.dmpFilesize
10.8MB
-
memory/5068-135-0x000000001C4D0000-0x000000001C64E000-memory.dmpFilesize
1.5MB
-
memory/5068-136-0x000000001C350000-0x000000001C3CC000-memory.dmpFilesize
496KB
-
memory/5068-141-0x00007FFCC3A60000-0x00007FFCC4521000-memory.dmpFilesize
10.8MB