Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/03/2023, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe
Resource
win10v2004-20230220-en
General
-
Target
b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe
-
Size
10.0MB
-
MD5
8b718c053968e68100029bc709579e63
-
SHA1
61b0ed38b226d15f0116f9781882d76d8ec3f4fe
-
SHA256
b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381
-
SHA512
393a4d47d28e00543b6ee37f527352381702a6c454df4b63afa59c3832a2b95dbe89694a7d8ff38f7eedb973d4d23bae142e1afe5da5be27ad21f785e1d7dbe8
-
SSDEEP
196608:Ga95hrgeuf+YfsgUyYuoI+l2C+NTh+gvlx5SdkIeSC5rdfqVWHJiCocTRlz:Ga9brpumJgRnC+Tx9x5SdkC4fQgJro+L
Malware Config
Extracted
raccoon
f49765d62e02586d0fe162b5d3a934ad
http://78.153.130.123/
http://212.113.119.35/
http://212.113.119.48/
http://212.113.106.218/
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 956 YeTf5PhA.exe 1548 VpmV93G1.exe 1896 VR3kZgbq.exe 1724 o7Q6e29U.exe -
Loads dropped DLL 7 IoCs
pid Process 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1896 VR3kZgbq.exe 1896 VR3kZgbq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 956 set thread context of 1204 956 YeTf5PhA.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1700 1204 WerFault.exe 31 -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 1896 VR3kZgbq.exe 1724 o7Q6e29U.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1616 wrote to memory of 956 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 29 PID 1616 wrote to memory of 956 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 29 PID 1616 wrote to memory of 956 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 29 PID 1616 wrote to memory of 956 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 29 PID 1616 wrote to memory of 1548 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 32 PID 1616 wrote to memory of 1548 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 32 PID 1616 wrote to memory of 1548 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 32 PID 1616 wrote to memory of 1548 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 32 PID 956 wrote to memory of 1204 956 YeTf5PhA.exe 31 PID 956 wrote to memory of 1204 956 YeTf5PhA.exe 31 PID 956 wrote to memory of 1204 956 YeTf5PhA.exe 31 PID 956 wrote to memory of 1204 956 YeTf5PhA.exe 31 PID 956 wrote to memory of 1204 956 YeTf5PhA.exe 31 PID 956 wrote to memory of 1204 956 YeTf5PhA.exe 31 PID 956 wrote to memory of 1204 956 YeTf5PhA.exe 31 PID 956 wrote to memory of 1204 956 YeTf5PhA.exe 31 PID 956 wrote to memory of 1204 956 YeTf5PhA.exe 31 PID 1616 wrote to memory of 1896 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 33 PID 1616 wrote to memory of 1896 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 33 PID 1616 wrote to memory of 1896 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 33 PID 1616 wrote to memory of 1896 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 33 PID 1204 wrote to memory of 1700 1204 AppLaunch.exe 34 PID 1204 wrote to memory of 1700 1204 AppLaunch.exe 34 PID 1204 wrote to memory of 1700 1204 AppLaunch.exe 34 PID 1204 wrote to memory of 1700 1204 AppLaunch.exe 34 PID 1204 wrote to memory of 1700 1204 AppLaunch.exe 34 PID 1204 wrote to memory of 1700 1204 AppLaunch.exe 34 PID 1204 wrote to memory of 1700 1204 AppLaunch.exe 34 PID 1616 wrote to memory of 1724 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 35 PID 1616 wrote to memory of 1724 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 35 PID 1616 wrote to memory of 1724 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 35 PID 1616 wrote to memory of 1724 1616 b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe"C:\Users\Admin\AppData\Local\Temp\b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\LocalLow\YeTf5PhA.exe"C:\Users\Admin\AppData\LocalLow\YeTf5PhA.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1204 -s 6844⤵
- Program crash
PID:1700
-
-
-
-
C:\Users\Admin\AppData\Roaming\VpmV93G1.exe"C:\Users\Admin\AppData\Roaming\VpmV93G1.exe"2⤵
- Executes dropped EXE
PID:1548
-
-
C:\Users\Admin\AppData\Roaming\VR3kZgbq.exe"C:\Users\Admin\AppData\Roaming\VR3kZgbq.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Users\Admin\AppData\Roaming\o7Q6e29U.exe"C:\Users\Admin\AppData\Roaming\o7Q6e29U.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5b3d4412e75660b9258d7888624191f11
SHA1985da61f2d1933b71802e31415f2a23db98c4dc1
SHA25650119521cfd783e8cdd116ecc430cc8feac61f455d24196aaaba086d13d80ef4
SHA512b2c3cc9c425983f8091a8b8dd11ef95f41b92936b9b5de1d0fb6b5112bcffb819ad8c65d9df59507a3e9fcb320217889923f6ed07cb5addb43b7448ffcc3f6f8
-
Filesize
7.5MB
MD5f5d957a42f578847664cacb8a4c3d695
SHA15affbea912936570480b7a6a0a7e67c6a2f62ec9
SHA25600978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc
SHA51207821df782858665c810e959e92f78de4af56e8d090069c5637537338244f9348f7a878bff95d72620b4c092fd97cfb2d15ffe1c097c36a86399a478ea406980
-
Filesize
7.5MB
MD5f5d957a42f578847664cacb8a4c3d695
SHA15affbea912936570480b7a6a0a7e67c6a2f62ec9
SHA25600978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc
SHA51207821df782858665c810e959e92f78de4af56e8d090069c5637537338244f9348f7a878bff95d72620b4c092fd97cfb2d15ffe1c097c36a86399a478ea406980
-
Filesize
53KB
MD56986f1d3d40626f825b3ebf0415fc54c
SHA14e498030af12be1c971aa8b06178c24266d39197
SHA2567e84d74990b3b4a9807b3072a2637c0c7035b2e9bc4f6e603b9f1766172fbf3e
SHA51202d095629b9fcd4d7e9b0e156adfd1da41e398848f7c37eb364dfac1636baa6933d95ffebe6083cd4eaafab09d341233ae4e83b47cfeb4e2dc73a30da85c822b
-
Filesize
53KB
MD56986f1d3d40626f825b3ebf0415fc54c
SHA14e498030af12be1c971aa8b06178c24266d39197
SHA2567e84d74990b3b4a9807b3072a2637c0c7035b2e9bc4f6e603b9f1766172fbf3e
SHA51202d095629b9fcd4d7e9b0e156adfd1da41e398848f7c37eb364dfac1636baa6933d95ffebe6083cd4eaafab09d341233ae4e83b47cfeb4e2dc73a30da85c822b
-
Filesize
56.8MB
MD51566dd917509b1b0607cf8e7cdbc9904
SHA1f0364c6d0e9558f2ccddbac19d6f3458833928ba
SHA25604fe8c6d7f1abacbf3f7077bbac69744647ba4b57a126ca70695bce71034ac91
SHA512bc1b3c84ee3eae53dd06cffd275420ce29afc2f62c3f7cf74d2d60f411a6eee3d1bebf4c923d7afa55a08fb1c99bd499cb20efeb23ed4e7dfd16e090417bfa54
-
Filesize
59.3MB
MD50c29b68f5b5741d9b173e70dcca8f061
SHA1f07a4c68fa8b063b72978d1ab78d57d0dd0d5c88
SHA25601c0540c54230f19a4a9a1f291df3e925fc4d1a040dd7e008e5d2ce49146fa3b
SHA512771c01b8f48e98598c746b5d13c115e8c31283a83b6813a51800a9a426858d7534c459937cff7adf4e5bc611c6146277fd6708c659676534dfcea9a7ead014b0
-
Filesize
216KB
MD5b3d4412e75660b9258d7888624191f11
SHA1985da61f2d1933b71802e31415f2a23db98c4dc1
SHA25650119521cfd783e8cdd116ecc430cc8feac61f455d24196aaaba086d13d80ef4
SHA512b2c3cc9c425983f8091a8b8dd11ef95f41b92936b9b5de1d0fb6b5112bcffb819ad8c65d9df59507a3e9fcb320217889923f6ed07cb5addb43b7448ffcc3f6f8
-
Filesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
Filesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
Filesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
Filesize
7.5MB
MD5f5d957a42f578847664cacb8a4c3d695
SHA15affbea912936570480b7a6a0a7e67c6a2f62ec9
SHA25600978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc
SHA51207821df782858665c810e959e92f78de4af56e8d090069c5637537338244f9348f7a878bff95d72620b4c092fd97cfb2d15ffe1c097c36a86399a478ea406980
-
Filesize
53KB
MD56986f1d3d40626f825b3ebf0415fc54c
SHA14e498030af12be1c971aa8b06178c24266d39197
SHA2567e84d74990b3b4a9807b3072a2637c0c7035b2e9bc4f6e603b9f1766172fbf3e
SHA51202d095629b9fcd4d7e9b0e156adfd1da41e398848f7c37eb364dfac1636baa6933d95ffebe6083cd4eaafab09d341233ae4e83b47cfeb4e2dc73a30da85c822b
-
Filesize
60.0MB
MD5425700efa711aa2f0d96e0671042532d
SHA183861ecab86c496c5fc69c567a129696a220da34
SHA2563f7c7ec7cc1d37c1cd62853bdc7ac9c06abe6434a8614d706f5e4c2bb8115d58
SHA5121d257f15370140c7fab0d16a02ab2e8c45ca344443bd11aa1fe4731440fa25a85bd206bd7163eb71d0e87dceccd234897a176962fcf778ea235b65e8489793f2