Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 14:44

General

  • Target

    b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe

  • Size

    10.0MB

  • MD5

    8b718c053968e68100029bc709579e63

  • SHA1

    61b0ed38b226d15f0116f9781882d76d8ec3f4fe

  • SHA256

    b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381

  • SHA512

    393a4d47d28e00543b6ee37f527352381702a6c454df4b63afa59c3832a2b95dbe89694a7d8ff38f7eedb973d4d23bae142e1afe5da5be27ad21f785e1d7dbe8

  • SSDEEP

    196608:Ga95hrgeuf+YfsgUyYuoI+l2C+NTh+gvlx5SdkIeSC5rdfqVWHJiCocTRlz:Ga9brpumJgRnC+Tx9x5SdkC4fQgJro+L

Malware Config

Extracted

Family

raccoon

Botnet

f49765d62e02586d0fe162b5d3a934ad

C2

http://78.153.130.123/

http://212.113.119.35/

http://212.113.119.48/

http://212.113.106.218/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Downloads MZ/PE file
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe
    "C:\Users\Admin\AppData\Local\Temp\b0ad1e810fe8f03af643aab5913fb0d40a282a0b290385db95e2478a0bd3e381.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\l2Zp5WP0.exe

    Filesize

    216KB

    MD5

    b3d4412e75660b9258d7888624191f11

    SHA1

    985da61f2d1933b71802e31415f2a23db98c4dc1

    SHA256

    50119521cfd783e8cdd116ecc430cc8feac61f455d24196aaaba086d13d80ef4

    SHA512

    b2c3cc9c425983f8091a8b8dd11ef95f41b92936b9b5de1d0fb6b5112bcffb819ad8c65d9df59507a3e9fcb320217889923f6ed07cb5addb43b7448ffcc3f6f8

  • C:\Users\Admin\AppData\LocalLow\mozglue.dll

    Filesize

    612KB

    MD5

    f07d9977430e762b563eaadc2b94bbfa

    SHA1

    da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

    SHA256

    4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

    SHA512

    6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

  • C:\Users\Admin\AppData\LocalLow\nss3.dll

    Filesize

    1.9MB

    MD5

    f67d08e8c02574cbc2f1122c53bfb976

    SHA1

    6522992957e7e4d074947cad63189f308a80fcf2

    SHA256

    c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

    SHA512

    2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

  • C:\Users\Admin\AppData\LocalLow\sqlite3.dll

    Filesize

    1.0MB

    MD5

    dbf4f8dcefb8056dc6bae4b67ff810ce

    SHA1

    bbac1dd8a07c6069415c04b62747d794736d0689

    SHA256

    47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

    SHA512

    b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

  • memory/908-133-0x0000000001560000-0x0000000001561000-memory.dmp

    Filesize

    4KB

  • memory/908-134-0x0000000000400000-0x000000000151E000-memory.dmp

    Filesize

    17.1MB

  • memory/908-180-0x0000000061E00000-0x0000000061EF1000-memory.dmp

    Filesize

    964KB