Analysis

  • max time kernel
    151s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    29-03-2023 02:49

General

  • Target

    PC-Set-UP_SOFT.exe

  • Size

    9.7MB

  • MD5

    bf7a18436887c2ba24ae483096365f35

  • SHA1

    01ff678f52d94a278ee5e14164eb7b9599675ed6

  • SHA256

    e1c98a0ade9b2f076c17c90bf42bafe1814fdbce24eb85cc401a72c1e1cfa601

  • SHA512

    d498f9bcdaf8389535f7ef16cfb73acc4d12b0f37b1afae49d5d8f731d147d19808d59fe010fe7195479987cd4a13461a5180aacc77364bff5da9e5f01dcc128

  • SSDEEP

    196608:RljSlVLHRCRaAKd6MYhMMy6oqX4w7rDdYuXCM4+e:PGvXZdyK4ny4CM4R

Malware Config

Extracted

Family

raccoon

Botnet

f49765d62e02586d0fe162b5d3a934ad

C2

http://5.75.159.229/

http://212.113.119.153/

http://78.153.130.123/

http://212.113.119.35/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PC-Set-UP_SOFT.exe
    "C:\Users\Admin\AppData\Local\Temp\PC-Set-UP_SOFT.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\LocalLow\8BZvqjck.exe
      "C:\Users\Admin\AppData\LocalLow\8BZvqjck.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 688
          4⤵
          • Program crash
          PID:1112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 36
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1364
    • C:\Users\Admin\AppData\Roaming\i92z18rG.exe
      "C:\Users\Admin\AppData\Roaming\i92z18rG.exe"
      2⤵
      • Executes dropped EXE
      PID:2028
    • C:\Users\Admin\AppData\Roaming\0KlK56gC.exe
      "C:\Users\Admin\AppData\Roaming\0KlK56gC.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1928
    • C:\Users\Admin\AppData\Roaming\Kr27sg7Q.exe
      "C:\Users\Admin\AppData\Roaming\Kr27sg7Q.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1072

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\8BZvqjck.exe

    Filesize

    251KB

    MD5

    26b02242e05cbfab57cec7654da6d5bb

    SHA1

    fa160aedb2ceef7af75e52e9f37b6878f5c011c5

    SHA256

    a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556

    SHA512

    1a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2

  • C:\Users\Admin\AppData\Roaming\0KlK56gC.exe

    Filesize

    5.8MB

    MD5

    e7a69210f26c7944b6e267d0d73af320

    SHA1

    cc03fe693690e4f45a7cca31782292f69e505801

    SHA256

    64b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2

    SHA512

    44345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07

  • C:\Users\Admin\AppData\Roaming\0KlK56gC.exe

    Filesize

    5.8MB

    MD5

    e7a69210f26c7944b6e267d0d73af320

    SHA1

    cc03fe693690e4f45a7cca31782292f69e505801

    SHA256

    64b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2

    SHA512

    44345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07

  • C:\Users\Admin\AppData\Roaming\Kr27sg7Q.exe

    Filesize

    168.7MB

    MD5

    5b0a98110d8c16c6e0cb19fea378d9ef

    SHA1

    9cb6d7f624cff3cba83efce421fa6201f98fa748

    SHA256

    6a71465bf2a1ab99cd2f5e32955122100be1f13998b920e0cdd130dd8ff90cce

    SHA512

    bfa7adf6c639a0de5d95f358f4c7b875ac26429a0a69f2036a5f59bdf61db6524b5e68cb86db41c7ef594572a92f23d5b2dda48ffa235cfca046d8f674d55eae

  • C:\Users\Admin\AppData\Roaming\Kr27sg7Q.exe

    Filesize

    134.7MB

    MD5

    8729fd0901f3a21e6f1a635f4cd0b9a1

    SHA1

    10a55e4bdfd5daee4e67c6811e3c2ff4827560aa

    SHA256

    57d66c9163dffae6f328a8c8dedcd8dde9ea18ba49b257b9539ebde874a2caa8

    SHA512

    96b02462acde3e5612d3e7a4112145b3c1cea2039cc7721a23cb1b41587ecd26613d7774c4f4ab69b6492bc6e6c0cac900ef4c9212e4de71efaccae51a72b0dc

  • C:\Users\Admin\AppData\Roaming\Kr27sg7Q.exe

    Filesize

    151.7MB

    MD5

    0fc851e934db29a734e781f1f2163962

    SHA1

    b44fbc30fab9966ca33791d275bb66a846c93f8b

    SHA256

    7cbc5fb93027d3f7a0ee0e4b7c7886859be713a8212d3be8dd6935e0695802de

    SHA512

    0d4f9d22de2b3102c576d7f3ef874f9002d97179e5f703fb2db80b90a3e953a6c43114f3037d0fd8b8ae73133e4efcba96320c004b75613cb4e6591f65bd4908

  • C:\Users\Admin\AppData\Roaming\i92z18rG.exe

    Filesize

    52KB

    MD5

    13e943e4a218b36c30fcc7fe865d5d93

    SHA1

    9fb188959cc18b754db75a50240973abe05d1635

    SHA256

    3fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4

    SHA512

    c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f

  • C:\Users\Admin\AppData\Roaming\i92z18rG.exe

    Filesize

    52KB

    MD5

    13e943e4a218b36c30fcc7fe865d5d93

    SHA1

    9fb188959cc18b754db75a50240973abe05d1635

    SHA256

    3fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4

    SHA512

    c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f

  • \Users\Admin\AppData\LocalLow\8BZvqjck.exe

    Filesize

    251KB

    MD5

    26b02242e05cbfab57cec7654da6d5bb

    SHA1

    fa160aedb2ceef7af75e52e9f37b6878f5c011c5

    SHA256

    a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556

    SHA512

    1a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2

  • \Users\Admin\AppData\LocalLow\8BZvqjck.exe

    Filesize

    251KB

    MD5

    26b02242e05cbfab57cec7654da6d5bb

    SHA1

    fa160aedb2ceef7af75e52e9f37b6878f5c011c5

    SHA256

    a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556

    SHA512

    1a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2

  • \Users\Admin\AppData\LocalLow\8BZvqjck.exe

    Filesize

    251KB

    MD5

    26b02242e05cbfab57cec7654da6d5bb

    SHA1

    fa160aedb2ceef7af75e52e9f37b6878f5c011c5

    SHA256

    a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556

    SHA512

    1a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2

  • \Users\Admin\AppData\LocalLow\8BZvqjck.exe

    Filesize

    251KB

    MD5

    26b02242e05cbfab57cec7654da6d5bb

    SHA1

    fa160aedb2ceef7af75e52e9f37b6878f5c011c5

    SHA256

    a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556

    SHA512

    1a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2

  • \Users\Admin\AppData\LocalLow\8BZvqjck.exe

    Filesize

    251KB

    MD5

    26b02242e05cbfab57cec7654da6d5bb

    SHA1

    fa160aedb2ceef7af75e52e9f37b6878f5c011c5

    SHA256

    a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556

    SHA512

    1a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2

  • \Users\Admin\AppData\LocalLow\8BZvqjck.exe

    Filesize

    251KB

    MD5

    26b02242e05cbfab57cec7654da6d5bb

    SHA1

    fa160aedb2ceef7af75e52e9f37b6878f5c011c5

    SHA256

    a7822c8b395e8d171ba566691780240e3a17b58a6cb8266d676fd54a542af556

    SHA512

    1a0d9c32bca30eecad3a2cb4e40902172b21f360f010cce88129806d33acccd630c19c590359cac6286db7205c014aaf4ea9e16cd9ec7b659eb5d821c2cd7fa2

  • \Users\Admin\AppData\LocalLow\mozglue.dll

    Filesize

    612KB

    MD5

    f07d9977430e762b563eaadc2b94bbfa

    SHA1

    da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

    SHA256

    4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

    SHA512

    6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

  • \Users\Admin\AppData\LocalLow\nss3.dll

    Filesize

    1.9MB

    MD5

    f67d08e8c02574cbc2f1122c53bfb976

    SHA1

    6522992957e7e4d074947cad63189f308a80fcf2

    SHA256

    c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

    SHA512

    2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

  • \Users\Admin\AppData\LocalLow\sqlite3.dll

    Filesize

    1.0MB

    MD5

    dbf4f8dcefb8056dc6bae4b67ff810ce

    SHA1

    bbac1dd8a07c6069415c04b62747d794736d0689

    SHA256

    47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

    SHA512

    b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

  • \Users\Admin\AppData\Roaming\0KlK56gC.exe

    Filesize

    5.8MB

    MD5

    e7a69210f26c7944b6e267d0d73af320

    SHA1

    cc03fe693690e4f45a7cca31782292f69e505801

    SHA256

    64b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2

    SHA512

    44345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07

  • \Users\Admin\AppData\Roaming\Kr27sg7Q.exe

    Filesize

    169.5MB

    MD5

    3f6297678a67c3e4b584e87d23ff973c

    SHA1

    6e43b2b1d31f0b70edaf8f4d2379fecad8434288

    SHA256

    61708025d919ef7293097f64cd9d4042f3e691579281e0f2e1c1457658f6a74e

    SHA512

    c9b46ef932dea515fb4144aa94db5f1e97da6daf828d52d457850b5efe975d01fa7f378e11338c210ce8b0412a075aa4f86cf1161b91cd4e912404d6ebf1cd8c

  • \Users\Admin\AppData\Roaming\i92z18rG.exe

    Filesize

    52KB

    MD5

    13e943e4a218b36c30fcc7fe865d5d93

    SHA1

    9fb188959cc18b754db75a50240973abe05d1635

    SHA256

    3fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4

    SHA512

    c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f

  • memory/1072-179-0x0000000000400000-0x0000000000D10000-memory.dmp

    Filesize

    9.1MB

  • memory/1152-116-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1152-145-0x0000000007170000-0x00000000071B0000-memory.dmp

    Filesize

    256KB

  • memory/1152-124-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1152-123-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1152-121-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1152-117-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1264-54-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/1264-109-0x0000000061E00000-0x0000000061EF1000-memory.dmp

    Filesize

    964KB

  • memory/1264-55-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/1264-56-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/1264-57-0x0000000000400000-0x00000000014C0000-memory.dmp

    Filesize

    16.8MB

  • memory/1928-148-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1928-149-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1928-150-0x0000000000400000-0x0000000000D10000-memory.dmp

    Filesize

    9.1MB

  • memory/2028-157-0x0000000004F90000-0x0000000004FD0000-memory.dmp

    Filesize

    256KB

  • memory/2028-159-0x0000000004F90000-0x0000000004FD0000-memory.dmp

    Filesize

    256KB

  • memory/2028-137-0x0000000001040000-0x0000000001054000-memory.dmp

    Filesize

    80KB

  • memory/2028-158-0x0000000004F90000-0x0000000004FD0000-memory.dmp

    Filesize

    256KB

  • memory/2028-144-0x0000000004F90000-0x0000000004FD0000-memory.dmp

    Filesize

    256KB

  • memory/2028-155-0x0000000004F90000-0x0000000004FD0000-memory.dmp

    Filesize

    256KB

  • memory/2028-154-0x0000000004F90000-0x0000000004FD0000-memory.dmp

    Filesize

    256KB