Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2023 06:02

General

  • Target

    readerdc64_es_l_mdr_install.exe

  • Size

    1.2MB

  • MD5

    a2e37f954986af9f88342b20b2965646

  • SHA1

    b298ce01bc93e8391acca3a07c0d06021df30dd6

  • SHA256

    8bc36f61610304148652cc7748ac1a215290f720d9e5e8df53d1d3b2c3c0e5fd

  • SHA512

    a492235f0e6de5f93200e0886bf4d3d77629777f28a5d517e87c3bb45e4266f339ab6a66d889434e617a3e4cec7248b488fb1e5aa0a73b6498ed7ec2d4073e7a

  • SSDEEP

    24576:YDDuX33Kl7LoDozrFH1edTVyJFeMxbsRIHZ9lWzirNj:pHKFcD4FHnU+bhgo

Score
10/10

Malware Config

Extracted

Family

raccoon

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\readerdc64_es_l_mdr_install.exe
    "C:\Users\Admin\AppData\Local\Temp\readerdc64_es_l_mdr_install.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Users\Admin\AppData\Local\Adobe\D09792AF-E0B8-4F56-9CC0-33CC9A458E29\EA177486-BAEB-448B-98C1-50EDC1E57F2A\D3592EA5-F7AB-487B-9C8C-37CE29074392
      "C:\Users\Admin\AppData\Local\Adobe\D09792AF-E0B8-4F56-9CC0-33CC9A458E29\EA177486-BAEB-448B-98C1-50EDC1E57F2A\D3592EA5-F7AB-487B-9C8C-37CE29074392" /sAll /re /msi PRODUCT_SOURCE=ACDC OWNERSHIP_STATE=1 UPDATE_MODE=3 EULA_ACCEPT=YES
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Adobe\D09792AF-E0B8-4F56-9CC0-33CC9A458E29\EA177486-BAEB-448B-98C1-50EDC1E57F2A\D3592EA5-F7AB-487B-9C8C-37CE29074392

    Filesize

    70.8MB

    MD5

    12c175de87b9d39d22022284bbe51033

    SHA1

    df2afd1319bb679287e1a7f78810c46c750525be

    SHA256

    6444149c0ef0fd8e2c0550398611620d6c5aaec4f5dfb3480afe9afc1b80199a

    SHA512

    6f5c6d53ab1aa9774c459aee8501317e7e00465708ed47cf7a3e579ac3f6e47cf767f7daf922c8d3fc60cee1cf958e9ab57b7a79f9c3628a7fa8e8bc1fe9b19b

  • C:\Users\Admin\AppData\Local\Adobe\D09792AF-E0B8-4F56-9CC0-33CC9A458E29\EA177486-BAEB-448B-98C1-50EDC1E57F2A\D3592EA5-F7AB-487B-9C8C-37CE29074392

    Filesize

    70.8MB

    MD5

    ae048e4a24d472285ece56be9aa0da69

    SHA1

    d5edb5aba00a3663b8107650aa361c95ba407990

    SHA256

    5124970ba8a42878c5f5c93d75880fe6f54b928913214392abc5ece326bfd65f

    SHA512

    5921d861965eef2d1c3939592ccdbdba8f037d3dba1dbed950e9ddbb6b03f133b4d199b9907a84e5f57be291a8a84ca6fa27367017924e1ac924fbad45a24214

  • memory/4844-132-0x00000000008D0000-0x0000000000D07000-memory.dmp

    Filesize

    4.2MB

  • memory/4844-133-0x00000000015E0000-0x00000000015E3000-memory.dmp

    Filesize

    12KB

  • memory/4844-134-0x00000000008D0000-0x0000000000D07000-memory.dmp

    Filesize

    4.2MB