Analysis

  • max time kernel
    108s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2023 08:56

General

  • Target

    aa089445af4df7e50055b303e1476d26e6fa9307c84732f23be5b5fa129e2d36.exe

  • Size

    249KB

  • MD5

    adbf34a17e486a4e325423ac6e8fecf1

  • SHA1

    80210bdfd834397c5a2644aef1601a965af0b0f2

  • SHA256

    aa089445af4df7e50055b303e1476d26e6fa9307c84732f23be5b5fa129e2d36

  • SHA512

    d1a48945c7c5ba25f9e3b00c06f74690c7470a054eddc029ce67ab772db8c9109cfe0308b1a4a206854bf5494f9eda7ae4fcffd7707d97e0a17ec441022fbd4e

  • SSDEEP

    3072:9uz7istXgHWJy2b9gx+XCFsr1aUQo8x59nFW15jxxCHfgvEZrYkZ5rDdhMhsby3j:9ufistzFh8UQ/x7FO5+HlhYkf4kL

Malware Config

Extracted

Family

raccoon

Botnet

96524e21debcf8762d45c72ca23e2ce6

C2

http://45.15.156.225/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Blocklisted process makes network request 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa089445af4df7e50055b303e1476d26e6fa9307c84732f23be5b5fa129e2d36.exe
    "C:\Users\Admin\AppData\Local\Temp\aa089445af4df7e50055b303e1476d26e6fa9307c84732f23be5b5fa129e2d36.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:/Windows/SysWOW64/WindowsPowerShell/v1.0/powershell.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        C:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe
        3⤵
          PID:3680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3064-133-0x00000000052E0000-0x0000000005884000-memory.dmp
      Filesize

      5.6MB

    • memory/3064-134-0x0000000004D30000-0x0000000004DC2000-memory.dmp
      Filesize

      584KB

    • memory/3064-135-0x0000000004C50000-0x0000000004C5A000-memory.dmp
      Filesize

      40KB

    • memory/3064-132-0x0000000000280000-0x00000000002C4000-memory.dmp
      Filesize

      272KB

    • memory/3680-147-0x0000000000000000-mapping.dmp
    • memory/3680-152-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/3680-151-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/3680-150-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/3680-148-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/5112-137-0x0000000002780000-0x00000000027B6000-memory.dmp
      Filesize

      216KB

    • memory/5112-142-0x00000000060A0000-0x00000000060BE000-memory.dmp
      Filesize

      120KB

    • memory/5112-143-0x0000000007240000-0x0000000007284000-memory.dmp
      Filesize

      272KB

    • memory/5112-144-0x00000000073A0000-0x0000000007416000-memory.dmp
      Filesize

      472KB

    • memory/5112-145-0x0000000007AA0000-0x000000000811A000-memory.dmp
      Filesize

      6.5MB

    • memory/5112-146-0x0000000007440000-0x000000000745A000-memory.dmp
      Filesize

      104KB

    • memory/5112-141-0x0000000005A80000-0x0000000005AE6000-memory.dmp
      Filesize

      408KB

    • memory/5112-140-0x00000000059A0000-0x0000000005A06000-memory.dmp
      Filesize

      408KB

    • memory/5112-139-0x00000000052D0000-0x00000000052F2000-memory.dmp
      Filesize

      136KB

    • memory/5112-138-0x0000000005300000-0x0000000005928000-memory.dmp
      Filesize

      6.2MB

    • memory/5112-136-0x0000000000000000-mapping.dmp