Analysis

  • max time kernel
    126s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2022 17:30

General

  • Target

    983ae55c5100ebb120a6c474fc12e0602289a9962b8d1c1679b0d1beff055067.exe

  • Size

    346KB

  • MD5

    d026a419ee15d08ebd5431c1a482b946

  • SHA1

    bf9c55373d6d2299ee4b2457f55b27bdedd9748c

  • SHA256

    983ae55c5100ebb120a6c474fc12e0602289a9962b8d1c1679b0d1beff055067

  • SHA512

    41bbcdaa9a0373e6cc849dbf3c84a8302891367a2b4e17fc4c37080db9dd6fe741e638afc9aa6d7862782c7968632ac121728eac7ceb416e2b0280592e1d501f

  • SSDEEP

    6144:0hsoL5TODllI6YYOTk0hkIkkql07KNx+s3C1En2E1a:0hRlTODLI6TOYr3k37KWsS1Uv

Malware Config

Extracted

Family

raccoon

Botnet

d8f44b07b06da3a90ad87ebc9249718c

C2

http://79.137.205.87/

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\983ae55c5100ebb120a6c474fc12e0602289a9962b8d1c1679b0d1beff055067.exe
    "C:\Users\Admin\AppData\Local\Temp\983ae55c5100ebb120a6c474fc12e0602289a9962b8d1c1679b0d1beff055067.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1572
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4596
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:3168
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "rovwer.exe" /P "Admin:N"
            4⤵
              PID:2400
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rovwer.exe" /P "Admin:R" /E
              4⤵
                PID:4308
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "..\99e342142d" /P "Admin:N"
                4⤵
                  PID:1956
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  4⤵
                    PID:924
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\99e342142d" /P "Admin:R" /E
                    4⤵
                      PID:4740
                  • C:\Users\Admin\AppData\Local\Temp\1000116001\fuoulvqwa.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000116001\fuoulvqwa.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:3316
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                      4⤵
                      • Loads dropped DLL
                      PID:3784
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 260
                      4⤵
                      • Program crash
                      PID:780
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                    3⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    • Accesses Microsoft Outlook profiles
                    • Suspicious behavior: EnumeratesProcesses
                    • outlook_win_path
                    PID:4748
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 904
                  2⤵
                  • Program crash
                  PID:3848
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4884 -ip 4884
                1⤵
                  PID:2384
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3316 -ip 3316
                  1⤵
                    PID:2512
                  • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2540
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 420
                      2⤵
                      • Program crash
                      PID:5112
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2540 -ip 2540
                    1⤵
                      PID:1832
                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      1⤵
                      • Executes dropped EXE
                      PID:480
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 480 -s 424
                        2⤵
                        • Program crash
                        PID:1624
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 480 -ip 480
                      1⤵
                        PID:2572

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Execution

                      Scripting

                      1
                      T1064

                      Scheduled Task

                      1
                      T1053

                      Persistence

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Scheduled Task

                      1
                      T1053

                      Privilege Escalation

                      Scheduled Task

                      1
                      T1053

                      Defense Evasion

                      Scripting

                      1
                      T1064

                      Modify Registry

                      1
                      T1112

                      Credential Access

                      Credentials in Files

                      2
                      T1081

                      Discovery

                      Query Registry

                      1
                      T1012

                      System Information Discovery

                      2
                      T1082

                      Collection

                      Data from Local System

                      2
                      T1005

                      Email Collection

                      1
                      T1114

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\mozglue.dll
                        Filesize

                        612KB

                        MD5

                        f07d9977430e762b563eaadc2b94bbfa

                        SHA1

                        da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

                        SHA256

                        4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

                        SHA512

                        6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

                      • C:\Users\Admin\AppData\LocalLow\nss3.dll
                        Filesize

                        1.9MB

                        MD5

                        f67d08e8c02574cbc2f1122c53bfb976

                        SHA1

                        6522992957e7e4d074947cad63189f308a80fcf2

                        SHA256

                        c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

                        SHA512

                        2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

                      • C:\Users\Admin\AppData\LocalLow\sqlite3.dll
                        Filesize

                        1.0MB

                        MD5

                        dbf4f8dcefb8056dc6bae4b67ff810ce

                        SHA1

                        bbac1dd8a07c6069415c04b62747d794736d0689

                        SHA256

                        47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

                        SHA512

                        b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

                      • C:\Users\Admin\AppData\Local\Temp\1000116001\fuoulvqwa.exe
                        Filesize

                        502KB

                        MD5

                        7603d680b2c7b88bd9339615f370c4d4

                        SHA1

                        4d28e7e6780af016b0eb58cfce8b97a8fa1060aa

                        SHA256

                        e97908ddfbb553735e47a47bb05e870ce346c5f09aeee05db5bbccd9a96958fd

                        SHA512

                        f886f509cef0d1344ce0dee3fb7dd7b995cb7552398f566682ac547c5891356c60f3dca5dde7f036e12f83c92b1136748c90d1d6235d4c8b46d204e26b935d41

                      • C:\Users\Admin\AppData\Local\Temp\1000116001\fuoulvqwa.exe
                        Filesize

                        502KB

                        MD5

                        7603d680b2c7b88bd9339615f370c4d4

                        SHA1

                        4d28e7e6780af016b0eb58cfce8b97a8fa1060aa

                        SHA256

                        e97908ddfbb553735e47a47bb05e870ce346c5f09aeee05db5bbccd9a96958fd

                        SHA512

                        f886f509cef0d1344ce0dee3fb7dd7b995cb7552398f566682ac547c5891356c60f3dca5dde7f036e12f83c92b1136748c90d1d6235d4c8b46d204e26b935d41

                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        Filesize

                        346KB

                        MD5

                        d026a419ee15d08ebd5431c1a482b946

                        SHA1

                        bf9c55373d6d2299ee4b2457f55b27bdedd9748c

                        SHA256

                        983ae55c5100ebb120a6c474fc12e0602289a9962b8d1c1679b0d1beff055067

                        SHA512

                        41bbcdaa9a0373e6cc849dbf3c84a8302891367a2b4e17fc4c37080db9dd6fe741e638afc9aa6d7862782c7968632ac121728eac7ceb416e2b0280592e1d501f

                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        Filesize

                        346KB

                        MD5

                        d026a419ee15d08ebd5431c1a482b946

                        SHA1

                        bf9c55373d6d2299ee4b2457f55b27bdedd9748c

                        SHA256

                        983ae55c5100ebb120a6c474fc12e0602289a9962b8d1c1679b0d1beff055067

                        SHA512

                        41bbcdaa9a0373e6cc849dbf3c84a8302891367a2b4e17fc4c37080db9dd6fe741e638afc9aa6d7862782c7968632ac121728eac7ceb416e2b0280592e1d501f

                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        Filesize

                        346KB

                        MD5

                        d026a419ee15d08ebd5431c1a482b946

                        SHA1

                        bf9c55373d6d2299ee4b2457f55b27bdedd9748c

                        SHA256

                        983ae55c5100ebb120a6c474fc12e0602289a9962b8d1c1679b0d1beff055067

                        SHA512

                        41bbcdaa9a0373e6cc849dbf3c84a8302891367a2b4e17fc4c37080db9dd6fe741e638afc9aa6d7862782c7968632ac121728eac7ceb416e2b0280592e1d501f

                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        Filesize

                        346KB

                        MD5

                        d026a419ee15d08ebd5431c1a482b946

                        SHA1

                        bf9c55373d6d2299ee4b2457f55b27bdedd9748c

                        SHA256

                        983ae55c5100ebb120a6c474fc12e0602289a9962b8d1c1679b0d1beff055067

                        SHA512

                        41bbcdaa9a0373e6cc849dbf3c84a8302891367a2b4e17fc4c37080db9dd6fe741e638afc9aa6d7862782c7968632ac121728eac7ceb416e2b0280592e1d501f

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                        Filesize

                        126KB

                        MD5

                        507e9dc7b9c42f535b6df96d79179835

                        SHA1

                        acf41fb549750023115f060071aa5ca8c33f249e

                        SHA256

                        3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                        SHA512

                        70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                        Filesize

                        126KB

                        MD5

                        507e9dc7b9c42f535b6df96d79179835

                        SHA1

                        acf41fb549750023115f060071aa5ca8c33f249e

                        SHA256

                        3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                        SHA512

                        70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                      • memory/480-172-0x0000000000904000-0x0000000000922000-memory.dmp
                        Filesize

                        120KB

                      • memory/480-173-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/924-146-0x0000000000000000-mapping.dmp
                      • memory/1512-132-0x0000000000000000-mapping.dmp
                      • memory/1512-143-0x0000000000920000-0x0000000000A20000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1512-145-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/1512-152-0x0000000000920000-0x0000000000A20000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1512-153-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/1572-139-0x0000000000000000-mapping.dmp
                      • memory/1956-147-0x0000000000000000-mapping.dmp
                      • memory/2400-142-0x0000000000000000-mapping.dmp
                      • memory/2540-170-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/2540-169-0x0000000000884000-0x00000000008A2000-memory.dmp
                        Filesize

                        120KB

                      • memory/3168-141-0x0000000000000000-mapping.dmp
                      • memory/3316-149-0x0000000000000000-mapping.dmp
                      • memory/3784-155-0x0000000000400000-0x0000000000412000-memory.dmp
                        Filesize

                        72KB

                      • memory/3784-154-0x0000000000000000-mapping.dmp
                      • memory/3784-161-0x0000000000400000-0x0000000000412000-memory.dmp
                        Filesize

                        72KB

                      • memory/4308-144-0x0000000000000000-mapping.dmp
                      • memory/4596-140-0x0000000000000000-mapping.dmp
                      • memory/4740-148-0x0000000000000000-mapping.dmp
                      • memory/4748-165-0x0000000000000000-mapping.dmp
                      • memory/4884-137-0x0000000000400000-0x0000000000859000-memory.dmp
                        Filesize

                        4.3MB

                      • memory/4884-136-0x00000000009C0000-0x00000000009FE000-memory.dmp
                        Filesize

                        248KB

                      • memory/4884-135-0x0000000000A32000-0x0000000000A51000-memory.dmp
                        Filesize

                        124KB