Analysis

  • max time kernel
    88s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2023 16:23

General

  • Target

    setupsoftapp19.0/setupsoftapp19.0.exe

  • Size

    662.6MB

  • MD5

    7e3b388e559cd52d89365b77809df136

  • SHA1

    e8dfcabcc2dfa7d803065d19b1922e08285bba93

  • SHA256

    1c45a3aadd842b6c8c1e2920a270cc0a23493cee81d1d1833e4471a1c72973a5

  • SHA512

    cebddf2f8b202f5e045bbaa74a3c3527f5fe8ee6352780217fd8413cb173d6ae164a76beeabd4a9da8633e51852528b70478ff4dacf2db588f9e869e54c1ec15

  • SSDEEP

    12288:/MqhiSc4GDW93i1m3ZarAxxHuAK9MYCDAOmCLwY7NZ/zj6hmS6H1tp6S979ESZGt:Hzcow15KyA751q

Malware Config

Extracted

Family

raccoon

Botnet

3f4a8564e5026a245d6974b020b3f6de

C2

http://45.15.156.225/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setupsoftapp19.0\setupsoftapp19.0.exe
    "C:\Users\Admin\AppData\Local\Temp\setupsoftapp19.0\setupsoftapp19.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:/Windows/SysWOW64/WindowsPowerShell/v1.0/powershell.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        C:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Users\Admin\AppData\Local\Temp\vsDPjfZh.exe
          "C:\Users\Admin\AppData\Local\Temp\vsDPjfZh.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3336
          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
            C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
            5⤵
            • Executes dropped EXE
            PID:2428

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\mozglue.dll
    Filesize

    612KB

    MD5

    f07d9977430e762b563eaadc2b94bbfa

    SHA1

    da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

    SHA256

    4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

    SHA512

    6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

  • C:\Users\Admin\AppData\LocalLow\nss3.dll
    Filesize

    1.9MB

    MD5

    f67d08e8c02574cbc2f1122c53bfb976

    SHA1

    6522992957e7e4d074947cad63189f308a80fcf2

    SHA256

    c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

    SHA512

    2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

  • C:\Users\Admin\AppData\LocalLow\sqlite3.dll
    Filesize

    1.0MB

    MD5

    dbf4f8dcefb8056dc6bae4b67ff810ce

    SHA1

    bbac1dd8a07c6069415c04b62747d794736d0689

    SHA256

    47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

    SHA512

    b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

  • C:\Users\Admin\AppData\Local\Temp\vsDPjfZh.exe
    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Local\Temp\vsDPjfZh.exe
    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
    Filesize

    566.2MB

    MD5

    56c9be9352be969363890310b8487a54

    SHA1

    222128bcc011cf4e845b926b26fae4866c5430ca

    SHA256

    43df50fcad3669188b3cac538416dffd5aee3ec24e7e5e5775fdd55da9e9d049

    SHA512

    c3495c2272c5e24813174c5f8fcaa93d0e493c9bffaa6d5ecdeb61bdfd0c7ad6a97fffc81d264b65e0aaf40375daeb8696fc3463042760a191e393c0b4804cb7

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
    Filesize

    584.9MB

    MD5

    ad2559daf3cd36f2d06746a9036d4f10

    SHA1

    1c0643d33ea67c504585c681e8cddf7fe5ce69b3

    SHA256

    929228ab8c17f39c8b0ee471f8bca7b253b65cdc0e5bcea086b3cec7e71402d1

    SHA512

    2b3fe00dc8612e2f3be7bad11c86827c2b7bd15d34ebdc3be6883fcd42b05d01dad58ec07d0ee1a0bcd5eb7db8d96ac5c7b37b7648107288cc4518a2cb7780e3

  • memory/2428-159-0x0000000000000000-mapping.dmp
  • memory/2868-155-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2868-147-0x0000000000000000-mapping.dmp
  • memory/2868-151-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2868-150-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2868-148-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2992-139-0x0000000004DC0000-0x0000000004DE2000-memory.dmp
    Filesize

    136KB

  • memory/2992-140-0x0000000005690000-0x00000000056F6000-memory.dmp
    Filesize

    408KB

  • memory/2992-145-0x0000000007800000-0x0000000007E7A000-memory.dmp
    Filesize

    6.5MB

  • memory/2992-144-0x0000000007100000-0x0000000007176000-memory.dmp
    Filesize

    472KB

  • memory/2992-143-0x0000000006320000-0x0000000006364000-memory.dmp
    Filesize

    272KB

  • memory/2992-142-0x0000000005DB0000-0x0000000005DCE000-memory.dmp
    Filesize

    120KB

  • memory/2992-141-0x0000000005770000-0x00000000057D6000-memory.dmp
    Filesize

    408KB

  • memory/2992-146-0x00000000070C0000-0x00000000070DA000-memory.dmp
    Filesize

    104KB

  • memory/2992-136-0x0000000000000000-mapping.dmp
  • memory/2992-138-0x0000000004EF0000-0x0000000005518000-memory.dmp
    Filesize

    6.2MB

  • memory/2992-137-0x00000000047E0000-0x0000000004816000-memory.dmp
    Filesize

    216KB

  • memory/3336-156-0x0000000000000000-mapping.dmp
  • memory/4880-132-0x0000000000E00000-0x0000000000E48000-memory.dmp
    Filesize

    288KB

  • memory/4880-135-0x00000000057E0000-0x00000000057EA000-memory.dmp
    Filesize

    40KB

  • memory/4880-134-0x0000000005870000-0x0000000005902000-memory.dmp
    Filesize

    584KB

  • memory/4880-133-0x0000000005E20000-0x00000000063C4000-memory.dmp
    Filesize

    5.6MB