Analysis
-
max time kernel
28s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
13/01/2023, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
f29f6dc54c33b2aae2950019ee54b04c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f29f6dc54c33b2aae2950019ee54b04c.exe
Resource
win10v2004-20220812-en
General
-
Target
f29f6dc54c33b2aae2950019ee54b04c.exe
-
Size
831KB
-
MD5
f29f6dc54c33b2aae2950019ee54b04c
-
SHA1
c37d98a04edbe68fbd4e054fe0e96b1c926460ea
-
SHA256
8c5df030de0c79f2155a60e0d5f41889ec8d07d441279d406996dca4639f8539
-
SHA512
3205deea23d0655968935d26028e895d10b82594afc0ce17a5e2454a4c50584dc11564f0f1acf46ec0cc41dc0b6d3e638803934649f5834c75b04e708473967c
-
SSDEEP
24576:Mf78hVkC6gGhgfyNbpiODGsSm+FGUz9q:MAhf6gGhgab6shWz
Malware Config
Extracted
raccoon
75ea4cb7f040eb3056eaa4e86a3a9d6c
http://91.215.85.146/
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Control Panel\International\Geo\Nation f29f6dc54c33b2aae2950019ee54b04c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 844 set thread context of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 844 f29f6dc54c33b2aae2950019ee54b04c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe 28 PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe 28 PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe 28 PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe 28 PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe 28 PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe 28 PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe 28 PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe 28 PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f29f6dc54c33b2aae2950019ee54b04c.exe"C:\Users\Admin\AppData\Local\Temp\f29f6dc54c33b2aae2950019ee54b04c.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\f29f6dc54c33b2aae2950019ee54b04c.exeC:\Users\Admin\AppData\Local\Temp\f29f6dc54c33b2aae2950019ee54b04c.exe2⤵PID:1160
-