Resubmissions

08-04-2023 01:15

230408-bmcrlsdc6z 10

08-04-2023 01:14

230408-blpd1sdc6y 3

08-04-2023 01:11

230408-bkfeqadc6t 3

Analysis

  • max time kernel
    96s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-04-2023 01:15

General

  • Target

    SoftwareSetup.rar

  • Size

    31.4MB

  • MD5

    047099eac98bee7e4d6197644bebe398

  • SHA1

    104638640b363dc997638e0106ff83b86b9f87ee

  • SHA256

    c5402ac75a86dc37508a502662ba0d6af32b81d570c86067da9ec695718c8ef9

  • SHA512

    55c432feaa7e14584f5a007225831df181a1688068b502d6028e90f58841256ad70fb0fc3cc863f75dadcfd139dee62406bda34ba220602324d4483e00eb9184

  • SSDEEP

    786432:b4cD8XDwz1tAUfsLllihvBCCKAduhYem2XM/cty9XAkj3:buwbsLihvBCtMbr2X+ctWQkj

Malware Config

Extracted

Family

raccoon

Botnet

ee2a3d190100b91c20d8bc284238dda6

C2

http://45.15.156.144/

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 48 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\SoftwareSetup.rar
    1⤵
    • Modifies registry class
    PID:4628
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SoftwareSetup.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4796
  • C:\Users\Admin\Desktop\setup.exe
    "C:\Users\Admin\Desktop\setup.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4492

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
    Filesize

    28KB

    MD5

    686a5c359652c3e2d054360e4a7bb156

    SHA1

    c67bdabde2fa1cc6b97a1c69f622efc159eca1ce

    SHA256

    af5b246c8f3944cc5e3359c38e5da015536b1c0ecd48007d663b7e953ec98b59

    SHA512

    da1e6ef3df94f765a2a2a6ceff18f3cd4a0d4f1c1bd2cf2f469143507374a909952d2f0a2c7079b6bb6e1cff44223a51bbcd1b5b3e814e78db3003ceffe575f9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
    Filesize

    28KB

    MD5

    5517e3f4927a3b9d46d46cf14b7d9de2

    SHA1

    867e538a9017d47c6448704b939b9b933e8bbbe3

    SHA256

    907815e778b17853bc168a5b932ea4f60a33eafba453b3118823bc8a1da1b1f0

    SHA512

    a53c209e00645395690ebd3d800f2f3b54b771ad87a5e00b7beba042011668f333b6de68b318943409631b5ea088174f97d3eabc968659d70a2597420e527ca9

  • C:\Users\Admin\Desktop\setup.exe
    Filesize

    503.2MB

    MD5

    4fcd1846fc683d196ef09f26ff3e7c33

    SHA1

    9e37ff43fc99cd4233216dc19f634b430af12a4a

    SHA256

    8d0fb719b460e5dcabe8c21ecb0c766a95060c6d3dde213468fa4fd48769cb72

    SHA512

    49781e28088f1fe0311ac6e0cc828c6bff3c88650ed261fbf2dc3065811b45f864fb62c4ef2d6688621899f2ea47e18fc5188a084c13860f243938d43846c90a

  • C:\Users\Admin\Desktop\setup.exe
    Filesize

    491.0MB

    MD5

    4026dae1952ee5ac2cb34d46ace77cd2

    SHA1

    38a70d26fbcac23a37ec8acb7da8666a10d4456c

    SHA256

    ca44e3c34ba990a5ba99845c0af57c98832ced826cdf4b51f0659d0df4ff659b

    SHA512

    efced4c692809d437331c74f0d4bb3b0346e40675843c59d996ffb67ac2da199c0028dd3c33d9e3a09acd48d39985c8d2905dbac6c58ca59eabaf197956fdcbc

  • memory/4492-149-0x0000000002180000-0x0000000002181000-memory.dmp
    Filesize

    4KB

  • memory/4492-150-0x0000000002190000-0x0000000002191000-memory.dmp
    Filesize

    4KB

  • memory/4492-151-0x0000000000400000-0x0000000002174000-memory.dmp
    Filesize

    29.5MB