Analysis
-
max time kernel
28s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
13-01-2023 17:55
Static task
static1
Behavioral task
behavioral1
Sample
f29f6dc54c33b2aae2950019ee54b04c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f29f6dc54c33b2aae2950019ee54b04c.exe
Resource
win10v2004-20220812-en
General
-
Target
f29f6dc54c33b2aae2950019ee54b04c.exe
-
Size
831KB
-
MD5
f29f6dc54c33b2aae2950019ee54b04c
-
SHA1
c37d98a04edbe68fbd4e054fe0e96b1c926460ea
-
SHA256
8c5df030de0c79f2155a60e0d5f41889ec8d07d441279d406996dca4639f8539
-
SHA512
3205deea23d0655968935d26028e895d10b82594afc0ce17a5e2454a4c50584dc11564f0f1acf46ec0cc41dc0b6d3e638803934649f5834c75b04e708473967c
-
SSDEEP
24576:Mf78hVkC6gGhgfyNbpiODGsSm+FGUz9q:MAhf6gGhgab6shWz
Malware Config
Extracted
raccoon
75ea4cb7f040eb3056eaa4e86a3a9d6c
http://91.215.85.146/
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f29f6dc54c33b2aae2950019ee54b04c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Control Panel\International\Geo\Nation f29f6dc54c33b2aae2950019ee54b04c.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f29f6dc54c33b2aae2950019ee54b04c.exedescription pid process target process PID 844 set thread context of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe f29f6dc54c33b2aae2950019ee54b04c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f29f6dc54c33b2aae2950019ee54b04c.exedescription pid process Token: SeDebugPrivilege 844 f29f6dc54c33b2aae2950019ee54b04c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f29f6dc54c33b2aae2950019ee54b04c.exedescription pid process target process PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe f29f6dc54c33b2aae2950019ee54b04c.exe PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe f29f6dc54c33b2aae2950019ee54b04c.exe PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe f29f6dc54c33b2aae2950019ee54b04c.exe PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe f29f6dc54c33b2aae2950019ee54b04c.exe PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe f29f6dc54c33b2aae2950019ee54b04c.exe PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe f29f6dc54c33b2aae2950019ee54b04c.exe PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe f29f6dc54c33b2aae2950019ee54b04c.exe PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe f29f6dc54c33b2aae2950019ee54b04c.exe PID 844 wrote to memory of 1160 844 f29f6dc54c33b2aae2950019ee54b04c.exe f29f6dc54c33b2aae2950019ee54b04c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f29f6dc54c33b2aae2950019ee54b04c.exe"C:\Users\Admin\AppData\Local\Temp\f29f6dc54c33b2aae2950019ee54b04c.exe"
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f29f6dc54c33b2aae2950019ee54b04c.exeC:\Users\Admin\AppData\Local\Temp\f29f6dc54c33b2aae2950019ee54b04c.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/844-54-0x0000000000310000-0x00000000003E6000-memory.dmpFilesize
856KB
-
memory/844-55-0x0000000075831000-0x0000000075833000-memory.dmpFilesize
8KB
-
memory/844-56-0x0000000004AF0000-0x0000000004BC4000-memory.dmpFilesize
848KB
-
memory/844-57-0x0000000004BE0000-0x0000000004C2A000-memory.dmpFilesize
296KB
-
memory/844-58-0x0000000004CB0000-0x0000000004D42000-memory.dmpFilesize
584KB
-
memory/1160-59-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1160-60-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1160-62-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1160-64-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1160-65-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1160-66-0x00000000004088ED-mapping.dmp