Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/03/2023, 14:44

General

  • Target

    b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe

  • Size

    10.0MB

  • MD5

    8b718c053968e68100029bc709579e63

  • SHA1

    61b0ed38b226d15f0116f9781882d76d8ec3f4fe

  • SHA256

    b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381

  • SHA512

    393a4d47d28e00543b6ee37f527352381702a6c454df4b63afa59c3832a2b95dbe89694a7d8ff38f7eedb973d4d23bae142e1afe5da5be27ad21f785e1d7dbe8

  • SSDEEP

    196608:Ga95hrgeuf+YfsgUyYuoI+l2C+NTh+gvlx5SdkIeSC5rdfqVWHJiCocTRlz:Ga9brpumJgRnC+Tx9x5SdkC4fQgJro+L

Malware Config

Extracted

Family

raccoon

Botnet

f49765d62e02586d0fe162b5d3a934ad

C2

http://78.153.130.123/

http://212.113.119.35/

http://212.113.119.48/

http://212.113.106.218/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe
    "C:\Users\Admin\AppData\Local\Temp\b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\LocalLow\YeTf5PhA.exe
      "C:\Users\Admin\AppData\LocalLow\YeTf5PhA.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1204 -s 684
          4⤵
          • Program crash
          PID:1700
    • C:\Users\Admin\AppData\Roaming\VpmV93G1.exe
      "C:\Users\Admin\AppData\Roaming\VpmV93G1.exe"
      2⤵
      • Executes dropped EXE
      PID:1548
    • C:\Users\Admin\AppData\Roaming\VR3kZgbq.exe
      "C:\Users\Admin\AppData\Roaming\VR3kZgbq.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1896
    • C:\Users\Admin\AppData\Roaming\o7Q6e29U.exe
      "C:\Users\Admin\AppData\Roaming\o7Q6e29U.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1724

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\YeTf5PhA.exe

          Filesize

          216KB

          MD5

          b3d4412e75660b9258d7888624191f11

          SHA1

          985da61f2d1933b71802e31415f2a23db98c4dc1

          SHA256

          50119521cfd783e8cdd116ecc430cc8feac61f455d24196aaaba086d13d80ef4

          SHA512

          b2c3cc9c425983f8091a8b8dd11ef95f41b92936b9b5de1d0fb6b5112bcffb819ad8c65d9df59507a3e9fcb320217889923f6ed07cb5addb43b7448ffcc3f6f8

        • C:\Users\Admin\AppData\Roaming\VR3kZgbq.exe

          Filesize

          7.5MB

          MD5

          f5d957a42f578847664cacb8a4c3d695

          SHA1

          5affbea912936570480b7a6a0a7e67c6a2f62ec9

          SHA256

          00978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc

          SHA512

          07821df782858665c810e959e92f78de4af56e8d090069c5637537338244f9348f7a878bff95d72620b4c092fd97cfb2d15ffe1c097c36a86399a478ea406980

        • C:\Users\Admin\AppData\Roaming\VR3kZgbq.exe

          Filesize

          7.5MB

          MD5

          f5d957a42f578847664cacb8a4c3d695

          SHA1

          5affbea912936570480b7a6a0a7e67c6a2f62ec9

          SHA256

          00978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc

          SHA512

          07821df782858665c810e959e92f78de4af56e8d090069c5637537338244f9348f7a878bff95d72620b4c092fd97cfb2d15ffe1c097c36a86399a478ea406980

        • C:\Users\Admin\AppData\Roaming\VpmV93G1.exe

          Filesize

          53KB

          MD5

          6986f1d3d40626f825b3ebf0415fc54c

          SHA1

          4e498030af12be1c971aa8b06178c24266d39197

          SHA256

          7e84d74990b3b4a9807b3072a2637c0c7035b2e9bc4f6e603b9f1766172fbf3e

          SHA512

          02d095629b9fcd4d7e9b0e156adfd1da41e398848f7c37eb364dfac1636baa6933d95ffebe6083cd4eaafab09d341233ae4e83b47cfeb4e2dc73a30da85c822b

        • C:\Users\Admin\AppData\Roaming\VpmV93G1.exe

          Filesize

          53KB

          MD5

          6986f1d3d40626f825b3ebf0415fc54c

          SHA1

          4e498030af12be1c971aa8b06178c24266d39197

          SHA256

          7e84d74990b3b4a9807b3072a2637c0c7035b2e9bc4f6e603b9f1766172fbf3e

          SHA512

          02d095629b9fcd4d7e9b0e156adfd1da41e398848f7c37eb364dfac1636baa6933d95ffebe6083cd4eaafab09d341233ae4e83b47cfeb4e2dc73a30da85c822b

        • C:\Users\Admin\AppData\Roaming\o7Q6e29U.exe

          Filesize

          56.8MB

          MD5

          1566dd917509b1b0607cf8e7cdbc9904

          SHA1

          f0364c6d0e9558f2ccddbac19d6f3458833928ba

          SHA256

          04fe8c6d7f1abacbf3f7077bbac69744647ba4b57a126ca70695bce71034ac91

          SHA512

          bc1b3c84ee3eae53dd06cffd275420ce29afc2f62c3f7cf74d2d60f411a6eee3d1bebf4c923d7afa55a08fb1c99bd499cb20efeb23ed4e7dfd16e090417bfa54

        • C:\Users\Admin\AppData\Roaming\o7Q6e29U.exe

          Filesize

          59.3MB

          MD5

          0c29b68f5b5741d9b173e70dcca8f061

          SHA1

          f07a4c68fa8b063b72978d1ab78d57d0dd0d5c88

          SHA256

          01c0540c54230f19a4a9a1f291df3e925fc4d1a040dd7e008e5d2ce49146fa3b

          SHA512

          771c01b8f48e98598c746b5d13c115e8c31283a83b6813a51800a9a426858d7534c459937cff7adf4e5bc611c6146277fd6708c659676534dfcea9a7ead014b0

        • \Users\Admin\AppData\LocalLow\YeTf5PhA.exe

          Filesize

          216KB

          MD5

          b3d4412e75660b9258d7888624191f11

          SHA1

          985da61f2d1933b71802e31415f2a23db98c4dc1

          SHA256

          50119521cfd783e8cdd116ecc430cc8feac61f455d24196aaaba086d13d80ef4

          SHA512

          b2c3cc9c425983f8091a8b8dd11ef95f41b92936b9b5de1d0fb6b5112bcffb819ad8c65d9df59507a3e9fcb320217889923f6ed07cb5addb43b7448ffcc3f6f8

        • \Users\Admin\AppData\LocalLow\mozglue.dll

          Filesize

          612KB

          MD5

          f07d9977430e762b563eaadc2b94bbfa

          SHA1

          da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

          SHA256

          4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

          SHA512

          6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

        • \Users\Admin\AppData\LocalLow\nss3.dll

          Filesize

          1.9MB

          MD5

          f67d08e8c02574cbc2f1122c53bfb976

          SHA1

          6522992957e7e4d074947cad63189f308a80fcf2

          SHA256

          c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

          SHA512

          2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

        • \Users\Admin\AppData\LocalLow\sqlite3.dll

          Filesize

          1.0MB

          MD5

          dbf4f8dcefb8056dc6bae4b67ff810ce

          SHA1

          bbac1dd8a07c6069415c04b62747d794736d0689

          SHA256

          47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

          SHA512

          b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

        • \Users\Admin\AppData\Roaming\VR3kZgbq.exe

          Filesize

          7.5MB

          MD5

          f5d957a42f578847664cacb8a4c3d695

          SHA1

          5affbea912936570480b7a6a0a7e67c6a2f62ec9

          SHA256

          00978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc

          SHA512

          07821df782858665c810e959e92f78de4af56e8d090069c5637537338244f9348f7a878bff95d72620b4c092fd97cfb2d15ffe1c097c36a86399a478ea406980

        • \Users\Admin\AppData\Roaming\VpmV93G1.exe

          Filesize

          53KB

          MD5

          6986f1d3d40626f825b3ebf0415fc54c

          SHA1

          4e498030af12be1c971aa8b06178c24266d39197

          SHA256

          7e84d74990b3b4a9807b3072a2637c0c7035b2e9bc4f6e603b9f1766172fbf3e

          SHA512

          02d095629b9fcd4d7e9b0e156adfd1da41e398848f7c37eb364dfac1636baa6933d95ffebe6083cd4eaafab09d341233ae4e83b47cfeb4e2dc73a30da85c822b

        • \Users\Admin\AppData\Roaming\o7Q6e29U.exe

          Filesize

          60.0MB

          MD5

          425700efa711aa2f0d96e0671042532d

          SHA1

          83861ecab86c496c5fc69c567a129696a220da34

          SHA256

          3f7c7ec7cc1d37c1cd62853bdc7ac9c06abe6434a8614d706f5e4c2bb8115d58

          SHA512

          1d257f15370140c7fab0d16a02ab2e8c45ca344443bd11aa1fe4731440fa25a85bd206bd7163eb71d0e87dceccd234897a176962fcf778ea235b65e8489793f2

        • memory/1204-174-0x0000000007140000-0x0000000007180000-memory.dmp

          Filesize

          256KB

        • memory/1204-123-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/1204-124-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/1204-128-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/1204-130-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/1204-131-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/1204-136-0x0000000007140000-0x0000000007180000-memory.dmp

          Filesize

          256KB

        • memory/1548-132-0x0000000001170000-0x0000000001184000-memory.dmp

          Filesize

          80KB

        • memory/1548-135-0x0000000000E70000-0x0000000000EB0000-memory.dmp

          Filesize

          256KB

        • memory/1548-171-0x0000000000E70000-0x0000000000EB0000-memory.dmp

          Filesize

          256KB

        • memory/1548-173-0x0000000000E70000-0x0000000000EB0000-memory.dmp

          Filesize

          256KB

        • memory/1548-177-0x0000000000E70000-0x0000000000EB0000-memory.dmp

          Filesize

          256KB

        • memory/1548-176-0x0000000000E70000-0x0000000000EB0000-memory.dmp

          Filesize

          256KB

        • memory/1548-170-0x0000000000E70000-0x0000000000EB0000-memory.dmp

          Filesize

          256KB

        • memory/1616-55-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/1616-54-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/1616-56-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/1616-57-0x0000000000400000-0x000000000151E000-memory.dmp

          Filesize

          17.1MB

        • memory/1616-91-0x0000000061E00000-0x0000000061EF1000-memory.dmp

          Filesize

          964KB

        • memory/1724-195-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/1724-194-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/1724-196-0x0000000000400000-0x0000000000D45000-memory.dmp

          Filesize

          9.3MB

        • memory/1896-147-0x0000000000090000-0x0000000000091000-memory.dmp

          Filesize

          4KB

        • memory/1896-158-0x0000000000180000-0x0000000000181000-memory.dmp

          Filesize

          4KB

        • memory/1896-159-0x0000000000180000-0x0000000000181000-memory.dmp

          Filesize

          4KB

        • memory/1896-161-0x0000000000190000-0x0000000000191000-memory.dmp

          Filesize

          4KB

        • memory/1896-162-0x0000000000190000-0x0000000000191000-memory.dmp

          Filesize

          4KB

        • memory/1896-164-0x00000000001A0000-0x00000000001A1000-memory.dmp

          Filesize

          4KB

        • memory/1896-165-0x00000000001A0000-0x00000000001A1000-memory.dmp

          Filesize

          4KB

        • memory/1896-166-0x0000000000B70000-0x0000000001720000-memory.dmp

          Filesize

          11.7MB

        • memory/1896-156-0x00000000000C0000-0x00000000000C1000-memory.dmp

          Filesize

          4KB

        • memory/1896-155-0x00000000000C0000-0x00000000000C1000-memory.dmp

          Filesize

          4KB

        • memory/1896-153-0x00000000000B0000-0x00000000000B1000-memory.dmp

          Filesize

          4KB

        • memory/1896-152-0x00000000000B0000-0x00000000000B1000-memory.dmp

          Filesize

          4KB

        • memory/1896-149-0x00000000000A0000-0x00000000000A1000-memory.dmp

          Filesize

          4KB

        • memory/1896-151-0x00000000000B0000-0x00000000000B1000-memory.dmp

          Filesize

          4KB

        • memory/1896-150-0x00000000000A0000-0x00000000000A1000-memory.dmp

          Filesize

          4KB

        • memory/1896-148-0x00000000000A0000-0x00000000000A1000-memory.dmp

          Filesize

          4KB

        • memory/1896-145-0x0000000000090000-0x0000000000091000-memory.dmp

          Filesize

          4KB

        • memory/1896-146-0x0000000000090000-0x0000000000091000-memory.dmp

          Filesize

          4KB

        • memory/1896-144-0x0000000000080000-0x0000000000081000-memory.dmp

          Filesize

          4KB

        • memory/1896-143-0x0000000000080000-0x0000000000081000-memory.dmp

          Filesize

          4KB