Analysis

  • max time kernel
    90s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2022 03:33

General

  • Target

    416/442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe

  • Size

    4.9MB

  • MD5

    219bb798c25ca37572626da432a34c7f

  • SHA1

    57ec641c709495090ddc9c4fb32edd2a067260e8

  • SHA256

    442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571

  • SHA512

    95ade4c8d7f18514a786f2d17d9499f6f2b1b9289fd77efd77eceaa6275bf8197b5461d91434612031ce8d80e7c5a9eaacccee1262d022720e6ce34483ecfdc5

  • SSDEEP

    49152:Kkriz5EgVfFuVx3J4feF48vdtgjUiNaWuwfGi4gblMejACsKa43wVrMVnd7btHf:KmMEg9nf+tltBWahdCjvD3wVraX

Malware Config

Extracted

Family

raccoon

Botnet

517bb0d640c1242c3f069aab3d1018d6

C2

http://51.195.166.178/

http://5.252.177.22

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
    "C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1756
    • C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
      C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
      2⤵
        PID:3652
      • C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
        C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
        2⤵
          PID:3568
        • C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
          C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
          2⤵
            PID:4172
          • C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
            C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
            2⤵
            • Checks computer location settings
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:4216
            • C:\Users\Admin\AppData\Roaming\i2gBBPwR.exe
              "C:\Users\Admin\AppData\Roaming\i2gBBPwR.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2652
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 5 /tn "Message Queuing Backup{J4G6S2B4M7X2-F6S2J7D9N5-H5D2A3X4V5}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\mqbkup.exe"
                4⤵
                • Creates scheduled task(s)
                PID:4804
              • C:\Windows\SysWOW64\schtasks.exe
                /C /Query /XML /TN "Message Queuing Backup{J4G6S2B4M7X2-F6S2J7D9N5-H5D2A3X4V5}"
                4⤵
                  PID:4824
                • C:\Windows\SysWOW64\schtasks.exe
                  /C /create /F /tn "Message Queuing Backup{J4G6S2B4M7X2-F6S2J7D9N5-H5D2A3X4V5}" /XML "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\67765327532705345647"
                  4⤵
                  • Creates scheduled task(s)
                  PID:3912
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 472
                  4⤵
                  • Program crash
                  PID:4364
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2652 -ip 2652
            1⤵
              PID:1572

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Execution

            Scheduled Task

            1
            T1053

            Persistence

            Scheduled Task

            1
            T1053

            Privilege Escalation

            Scheduled Task

            1
            T1053

            Credential Access

            Credentials in Files

            2
            T1081

            Discovery

            Query Registry

            2
            T1012

            System Information Discovery

            2
            T1082

            Collection

            Data from Local System

            2
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\mozglue.dll
              Filesize

              612KB

              MD5

              f07d9977430e762b563eaadc2b94bbfa

              SHA1

              da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

              SHA256

              4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

              SHA512

              6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

            • C:\Users\Admin\AppData\LocalLow\nss3.dll
              Filesize

              1.9MB

              MD5

              f67d08e8c02574cbc2f1122c53bfb976

              SHA1

              6522992957e7e4d074947cad63189f308a80fcf2

              SHA256

              c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

              SHA512

              2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

            • C:\Users\Admin\AppData\LocalLow\sqlite3.dll
              Filesize

              1.0MB

              MD5

              dbf4f8dcefb8056dc6bae4b67ff810ce

              SHA1

              bbac1dd8a07c6069415c04b62747d794736d0689

              SHA256

              47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

              SHA512

              b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\67765327532705345647
              Filesize

              1KB

              MD5

              bd230d7613388478a5f643f0cb4ae039

              SHA1

              8be1171eae8cc9e0ff002449aeae679264c5765e

              SHA256

              9601df02d1916e294fabe7c17439d435c7ba065a3e6aa86ddeb5f4811096b320

              SHA512

              62606fe9f462d3800abfe8fcd4b829d314f3cdb416e79e995b62db067b55921e1e162dbaafd4e67b2e7e9d34cf91a9eca4cb628045552ce286b48dcd8016351a

            • C:\Users\Admin\AppData\Roaming\i2gBBPwR.exe
              Filesize

              6.0MB

              MD5

              c72472cee7655d0166cbaa031bdcee84

              SHA1

              8dc9a6a4f9b022a4228dfba208b27c52c6fc31cc

              SHA256

              007ca65416de12bf0fc7046431bb91a39af8310c264ac0e81afc5b3ac5c14058

              SHA512

              9e606674878b61de6af819eae6cac22807305da51f3012f5b86baf199a453e02d60a90ffdcc4626cce5b1812f16006362828daf23dab4c3ebc0d088ee268830c

            • C:\Users\Admin\AppData\Roaming\i2gBBPwR.exe
              Filesize

              6.0MB

              MD5

              c72472cee7655d0166cbaa031bdcee84

              SHA1

              8dc9a6a4f9b022a4228dfba208b27c52c6fc31cc

              SHA256

              007ca65416de12bf0fc7046431bb91a39af8310c264ac0e81afc5b3ac5c14058

              SHA512

              9e606674878b61de6af819eae6cac22807305da51f3012f5b86baf199a453e02d60a90ffdcc4626cce5b1812f16006362828daf23dab4c3ebc0d088ee268830c

            • memory/1756-138-0x00000000027A0000-0x00000000027D6000-memory.dmp
              Filesize

              216KB

            • memory/1756-139-0x0000000005040000-0x0000000005668000-memory.dmp
              Filesize

              6.2MB

            • memory/1756-140-0x0000000004FD0000-0x0000000005036000-memory.dmp
              Filesize

              408KB

            • memory/1756-141-0x0000000005720000-0x0000000005786000-memory.dmp
              Filesize

              408KB

            • memory/1756-142-0x0000000005D90000-0x0000000005DAE000-memory.dmp
              Filesize

              120KB

            • memory/1756-143-0x0000000007410000-0x0000000007A8A000-memory.dmp
              Filesize

              6.5MB

            • memory/1756-144-0x0000000006220000-0x000000000623A000-memory.dmp
              Filesize

              104KB

            • memory/1756-137-0x0000000000000000-mapping.dmp
            • memory/2652-165-0x0000000000400000-0x0000000000D60000-memory.dmp
              Filesize

              9.4MB

            • memory/2652-162-0x0000000000400000-0x0000000000D60000-memory.dmp
              Filesize

              9.4MB

            • memory/2652-155-0x0000000000000000-mapping.dmp
            • memory/2652-159-0x0000000000400000-0x0000000000D60000-memory.dmp
              Filesize

              9.4MB

            • memory/2680-132-0x0000000000E50000-0x0000000001338000-memory.dmp
              Filesize

              4.9MB

            • memory/2680-136-0x0000000006180000-0x00000000061A2000-memory.dmp
              Filesize

              136KB

            • memory/2680-135-0x0000000005E40000-0x0000000005E4A000-memory.dmp
              Filesize

              40KB

            • memory/2680-134-0x0000000005E90000-0x0000000005F22000-memory.dmp
              Filesize

              584KB

            • memory/2680-133-0x00000000062A0000-0x0000000006844000-memory.dmp
              Filesize

              5.6MB

            • memory/3568-146-0x0000000000000000-mapping.dmp
            • memory/3652-145-0x0000000000000000-mapping.dmp
            • memory/3912-163-0x0000000000000000-mapping.dmp
            • memory/4172-147-0x0000000000000000-mapping.dmp
            • memory/4216-148-0x0000000000000000-mapping.dmp
            • memory/4216-158-0x0000000000400000-0x0000000000414000-memory.dmp
              Filesize

              80KB

            • memory/4216-151-0x0000000000400000-0x0000000000414000-memory.dmp
              Filesize

              80KB

            • memory/4216-149-0x0000000000400000-0x0000000000414000-memory.dmp
              Filesize

              80KB

            • memory/4804-160-0x0000000000000000-mapping.dmp
            • memory/4824-161-0x0000000000000000-mapping.dmp