Analysis

  • max time kernel
    130s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2022 17:15

General

  • Target

    0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e.exe

  • Size

    346KB

  • MD5

    94cfb05ebec8347824c6a47b1f134cf1

  • SHA1

    be422dfc6d32411c8e28fb83c0d77eb28103dc9a

  • SHA256

    0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

  • SHA512

    3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

  • SSDEEP

    6144:BkXvLzTOjlPdnarcQH4nu58vk3m7eQj25En2E1a:Bk/fTOj7arVmZd7fjeUv

Malware Config

Extracted

Family

raccoon

Botnet

d8f44b07b06da3a90ad87ebc9249718c

C2

http://79.137.205.87/

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 5 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e.exe
    "C:\Users\Admin\AppData\Local\Temp\0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4428
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:1104
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "rovwer.exe" /P "Admin:N"
            4⤵
              PID:1044
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "rovwer.exe" /P "Admin:R" /E
              4⤵
                PID:4932
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:4644
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\99e342142d" /P "Admin:N"
                  4⤵
                    PID:4908
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\99e342142d" /P "Admin:R" /E
                    4⤵
                      PID:1612
                  • C:\Users\Admin\AppData\Local\Temp\1000116001\fuoulvqwa.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000116001\fuoulvqwa.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:2388
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                      4⤵
                      • Loads dropped DLL
                      PID:4124
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 140
                      4⤵
                      • Program crash
                      PID:3652
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                    3⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    • Accesses Microsoft Outlook profiles
                    • Suspicious behavior: EnumeratesProcesses
                    • outlook_win_path
                    PID:1096
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 1204
                  2⤵
                  • Program crash
                  PID:2208
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2988 -ip 2988
                1⤵
                  PID:2576
                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3524
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 420
                    2⤵
                    • Program crash
                    PID:972
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3524 -ip 3524
                  1⤵
                    PID:2072
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2388 -ip 2388
                    1⤵
                      PID:4896
                    • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                      1⤵
                      • Executes dropped EXE
                      PID:3760
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 420
                        2⤵
                        • Program crash
                        PID:3972
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3760 -ip 3760
                      1⤵
                        PID:3756
                      • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                        1⤵
                        • Executes dropped EXE
                        PID:4236
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 420
                          2⤵
                          • Program crash
                          PID:2148
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4236 -ip 4236
                        1⤵
                          PID:4600

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Execution

                        Scripting

                        1
                        T1064

                        Scheduled Task

                        1
                        T1053

                        Persistence

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Scheduled Task

                        1
                        T1053

                        Privilege Escalation

                        Scheduled Task

                        1
                        T1053

                        Defense Evasion

                        Scripting

                        1
                        T1064

                        Modify Registry

                        1
                        T1112

                        Credential Access

                        Credentials in Files

                        2
                        T1081

                        Discovery

                        Query Registry

                        1
                        T1012

                        System Information Discovery

                        2
                        T1082

                        Collection

                        Data from Local System

                        2
                        T1005

                        Email Collection

                        1
                        T1114

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\mozglue.dll
                          Filesize

                          612KB

                          MD5

                          f07d9977430e762b563eaadc2b94bbfa

                          SHA1

                          da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

                          SHA256

                          4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

                          SHA512

                          6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

                        • C:\Users\Admin\AppData\LocalLow\nss3.dll
                          Filesize

                          1.9MB

                          MD5

                          f67d08e8c02574cbc2f1122c53bfb976

                          SHA1

                          6522992957e7e4d074947cad63189f308a80fcf2

                          SHA256

                          c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

                          SHA512

                          2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

                        • C:\Users\Admin\AppData\LocalLow\sqlite3.dll
                          Filesize

                          1.0MB

                          MD5

                          dbf4f8dcefb8056dc6bae4b67ff810ce

                          SHA1

                          bbac1dd8a07c6069415c04b62747d794736d0689

                          SHA256

                          47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

                          SHA512

                          b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

                        • C:\Users\Admin\AppData\Local\Temp\1000116001\fuoulvqwa.exe
                          Filesize

                          502KB

                          MD5

                          7603d680b2c7b88bd9339615f370c4d4

                          SHA1

                          4d28e7e6780af016b0eb58cfce8b97a8fa1060aa

                          SHA256

                          e97908ddfbb553735e47a47bb05e870ce346c5f09aeee05db5bbccd9a96958fd

                          SHA512

                          f886f509cef0d1344ce0dee3fb7dd7b995cb7552398f566682ac547c5891356c60f3dca5dde7f036e12f83c92b1136748c90d1d6235d4c8b46d204e26b935d41

                        • C:\Users\Admin\AppData\Local\Temp\1000116001\fuoulvqwa.exe
                          Filesize

                          502KB

                          MD5

                          7603d680b2c7b88bd9339615f370c4d4

                          SHA1

                          4d28e7e6780af016b0eb58cfce8b97a8fa1060aa

                          SHA256

                          e97908ddfbb553735e47a47bb05e870ce346c5f09aeee05db5bbccd9a96958fd

                          SHA512

                          f886f509cef0d1344ce0dee3fb7dd7b995cb7552398f566682ac547c5891356c60f3dca5dde7f036e12f83c92b1136748c90d1d6235d4c8b46d204e26b935d41

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          346KB

                          MD5

                          94cfb05ebec8347824c6a47b1f134cf1

                          SHA1

                          be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                          SHA256

                          0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                          SHA512

                          3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          346KB

                          MD5

                          94cfb05ebec8347824c6a47b1f134cf1

                          SHA1

                          be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                          SHA256

                          0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                          SHA512

                          3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          346KB

                          MD5

                          94cfb05ebec8347824c6a47b1f134cf1

                          SHA1

                          be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                          SHA256

                          0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                          SHA512

                          3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          346KB

                          MD5

                          94cfb05ebec8347824c6a47b1f134cf1

                          SHA1

                          be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                          SHA256

                          0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                          SHA512

                          3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          346KB

                          MD5

                          94cfb05ebec8347824c6a47b1f134cf1

                          SHA1

                          be422dfc6d32411c8e28fb83c0d77eb28103dc9a

                          SHA256

                          0e33b9e1a35c18a87afd29b937ea7e04c246392939c616bd17c448632163aa8e

                          SHA512

                          3b7ed9e8cebf8a32180906615d07ed97b16c47aebfd5a18e1778dacbbc8a0889ff0a4a826334e39654e13f6b565340e76dae313aacf1448f9539345a0cb8c130

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                          Filesize

                          126KB

                          MD5

                          507e9dc7b9c42f535b6df96d79179835

                          SHA1

                          acf41fb549750023115f060071aa5ca8c33f249e

                          SHA256

                          3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                          SHA512

                          70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                          Filesize

                          126KB

                          MD5

                          507e9dc7b9c42f535b6df96d79179835

                          SHA1

                          acf41fb549750023115f060071aa5ca8c33f249e

                          SHA256

                          3b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af

                          SHA512

                          70907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302

                        • memory/1044-142-0x0000000000000000-mapping.dmp
                        • memory/1096-167-0x0000000000000000-mapping.dmp
                        • memory/1104-141-0x0000000000000000-mapping.dmp
                        • memory/1264-148-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/1264-155-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/1264-147-0x0000000000B93000-0x0000000000BB2000-memory.dmp
                          Filesize

                          124KB

                        • memory/1264-133-0x0000000000000000-mapping.dmp
                        • memory/1384-140-0x0000000000000000-mapping.dmp
                        • memory/1612-146-0x0000000000000000-mapping.dmp
                        • memory/2388-149-0x0000000000000000-mapping.dmp
                        • memory/2988-138-0x00000000009F2000-0x0000000000A11000-memory.dmp
                          Filesize

                          124KB

                        • memory/2988-132-0x00000000009F2000-0x0000000000A11000-memory.dmp
                          Filesize

                          124KB

                        • memory/2988-137-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/2988-136-0x0000000000BE0000-0x0000000000C1E000-memory.dmp
                          Filesize

                          248KB

                        • memory/3524-153-0x00000000009A4000-0x00000000009C2000-memory.dmp
                          Filesize

                          120KB

                        • memory/3524-154-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/3760-172-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/3760-171-0x0000000000B34000-0x0000000000B52000-memory.dmp
                          Filesize

                          120KB

                        • memory/4124-163-0x0000000000400000-0x0000000000412000-memory.dmp
                          Filesize

                          72KB

                        • memory/4124-157-0x0000000000400000-0x0000000000412000-memory.dmp
                          Filesize

                          72KB

                        • memory/4124-156-0x0000000000000000-mapping.dmp
                        • memory/4236-174-0x0000000000AD4000-0x0000000000AF2000-memory.dmp
                          Filesize

                          120KB

                        • memory/4236-175-0x0000000000400000-0x0000000000859000-memory.dmp
                          Filesize

                          4.3MB

                        • memory/4428-139-0x0000000000000000-mapping.dmp
                        • memory/4644-144-0x0000000000000000-mapping.dmp
                        • memory/4908-145-0x0000000000000000-mapping.dmp
                        • memory/4932-143-0x0000000000000000-mapping.dmp