Analysis

  • max time kernel
    94s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2023 14:27

General

  • Target

    Expert-PC-2023.exe

  • Size

    730.9MB

  • MD5

    1cc87e637e55a2e6a88c745855423045

  • SHA1

    7e837f0a6854e6f0b68f417bb8f5f8dc2daeee23

  • SHA256

    6148a04932be8b508c730fae9b7a8b67d96bd5bd21801a047e34a8e819a55c62

  • SHA512

    c23bce8c05365d9e626f2b6d49e3d74608c55a31977eaa01981962f105abed5a3c30ebd18a3a0c5c8bdb29c9746227ce063a093964edf367262bfab27bfd2827

  • SSDEEP

    196608:UUJOFXQovEaJV73j5m9iepb+EDGVV3hCKboTEWMw6FO5+3Z4KW:UEfovJ13jk9Xp+VVRJbdwRiDW

Malware Config

Extracted

Family

raccoon

Botnet

9429a6d92284fd6d41daa221d04032be

C2

http://212.113.119.153/

http://77.91.84.147/

http://212.113.119.35/

http://79.137.248.245/

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Expert-PC-2023.exe
    "C:\Users\Admin\AppData\Local\Temp\Expert-PC-2023.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\LocalLow\yz5QbPVN.exe
      "C:\Users\Admin\AppData\LocalLow\yz5QbPVN.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 684
          4⤵
          • Program crash
          PID:1896
    • C:\Users\Admin\AppData\Roaming\4IxLg0UY.exe
      "C:\Users\Admin\AppData\Roaming\4IxLg0UY.exe"
      2⤵
      • Executes dropped EXE
      PID:884
    • C:\Users\Admin\AppData\Local\Temp\88jgdhdI.exe
      "C:\Users\Admin\AppData\Local\Temp\88jgdhdI.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1056

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\yz5QbPVN.exe

    Filesize

    308KB

    MD5

    d368e0e221d5e7daf9d4dc2825136dac

    SHA1

    448008dbad33ef3dc02431b7f7e7fb7ffb6e1e40

    SHA256

    d981feca3b0fb43369c3b0fdbb5e4fe6d66631ca6bdb706e8e52a4e849f484da

    SHA512

    75ab7f199b06a0d36d10c8602cb45df3bdced1c6239be7a5af3a10332b5c8a4e0d9c4477af0880d78b6e77679d7bc96cb441ca49e8f77572b9811fc19321c17a

  • C:\Users\Admin\AppData\Local\Temp\88jgdhdI.exe

    Filesize

    277.6MB

    MD5

    4d6da7e30acaf3216b0c89fbe4bc1fd1

    SHA1

    60dfcdbf1d5782bf831ce76532ae479b8d547e53

    SHA256

    c79690aa69adfc71315c88f66dcece3d1ab07821ff02294effc41b4427a6d7f7

    SHA512

    e23350d0e672f5ad0fd4482551ce0b1186a5d1a98edab2d16f8a076078a8d39a211e0b26db7543b2e5ae724217e78d810306f094bf190d840d7669f005a57642

  • C:\Users\Admin\AppData\Local\Temp\88jgdhdI.exe

    Filesize

    256.8MB

    MD5

    2d37a52665c9296c6eec1f92c5c9da6b

    SHA1

    caae55ce6d92935a6c818860c6ada8ed5da12c00

    SHA256

    b990d589316a037c9fe16adb85e9dafd9b85749a3259cc58e7fe67fe3009e89e

    SHA512

    32b51ee498a60881b1d928f9da072f6f46ff2fdf9e2180b78382b6c4dcb9ac8639ca554aceacc47cd587c6db31576fe30d899996437e6ff0ceb9b42e175a8f1d

  • C:\Users\Admin\AppData\Roaming\4IxLg0UY.exe

    Filesize

    48KB

    MD5

    a23629286d856fa79cdf0d0012746bd7

    SHA1

    f5879c4d4506f750fe2cc510c8aedf5a6db462d6

    SHA256

    b7ff7973cae49e3e8bafe21ee7b7c7a6b713c2893cefa844c5f4ff134403118a

    SHA512

    99ea72147871288d65bc817d960c42a1e3f64dc29f972dd094fbea2f3764cadbec6470efe1458844653f87fa8aff862e91b83cc4c84632f69b8fa5685f1c7cde

  • C:\Users\Admin\AppData\Roaming\4IxLg0UY.exe

    Filesize

    48KB

    MD5

    a23629286d856fa79cdf0d0012746bd7

    SHA1

    f5879c4d4506f750fe2cc510c8aedf5a6db462d6

    SHA256

    b7ff7973cae49e3e8bafe21ee7b7c7a6b713c2893cefa844c5f4ff134403118a

    SHA512

    99ea72147871288d65bc817d960c42a1e3f64dc29f972dd094fbea2f3764cadbec6470efe1458844653f87fa8aff862e91b83cc4c84632f69b8fa5685f1c7cde

  • \Users\Admin\AppData\LocalLow\mozglue.dll

    Filesize

    612KB

    MD5

    f07d9977430e762b563eaadc2b94bbfa

    SHA1

    da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

    SHA256

    4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

    SHA512

    6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

  • \Users\Admin\AppData\LocalLow\nss3.dll

    Filesize

    1.9MB

    MD5

    f67d08e8c02574cbc2f1122c53bfb976

    SHA1

    6522992957e7e4d074947cad63189f308a80fcf2

    SHA256

    c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

    SHA512

    2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

  • \Users\Admin\AppData\LocalLow\sqlite3.dll

    Filesize

    1.0MB

    MD5

    dbf4f8dcefb8056dc6bae4b67ff810ce

    SHA1

    bbac1dd8a07c6069415c04b62747d794736d0689

    SHA256

    47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

    SHA512

    b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

  • \Users\Admin\AppData\LocalLow\yz5QbPVN.exe

    Filesize

    308KB

    MD5

    d368e0e221d5e7daf9d4dc2825136dac

    SHA1

    448008dbad33ef3dc02431b7f7e7fb7ffb6e1e40

    SHA256

    d981feca3b0fb43369c3b0fdbb5e4fe6d66631ca6bdb706e8e52a4e849f484da

    SHA512

    75ab7f199b06a0d36d10c8602cb45df3bdced1c6239be7a5af3a10332b5c8a4e0d9c4477af0880d78b6e77679d7bc96cb441ca49e8f77572b9811fc19321c17a

  • \Users\Admin\AppData\Local\Temp\88jgdhdI.exe

    Filesize

    261.4MB

    MD5

    9067775bdd0011e6dbb9e07471be14e3

    SHA1

    c542963881ce9d1f0d73b8cd28fa19f5dcc4d5a3

    SHA256

    33a3b0e3df96fc295a6d844585cf3858d906d9e3d33ca8284b9e1e139ec077e6

    SHA512

    11502c6e5589eebb9931b253d7d816693a4957e52c33ef50eb817238819e41c48fb4aa09a50284e9cd98a7b6c480a1e0656b0ba48592370354e636bbcbf21c67

  • \Users\Admin\AppData\Roaming\4IxLg0UY.exe

    Filesize

    48KB

    MD5

    a23629286d856fa79cdf0d0012746bd7

    SHA1

    f5879c4d4506f750fe2cc510c8aedf5a6db462d6

    SHA256

    b7ff7973cae49e3e8bafe21ee7b7c7a6b713c2893cefa844c5f4ff134403118a

    SHA512

    99ea72147871288d65bc817d960c42a1e3f64dc29f972dd094fbea2f3764cadbec6470efe1458844653f87fa8aff862e91b83cc4c84632f69b8fa5685f1c7cde

  • memory/884-138-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

    Filesize

    256KB

  • memory/884-133-0x0000000000F20000-0x0000000000F32000-memory.dmp

    Filesize

    72KB

  • memory/884-143-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

    Filesize

    256KB

  • memory/884-142-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

    Filesize

    256KB

  • memory/884-140-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

    Filesize

    256KB

  • memory/884-137-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

    Filesize

    256KB

  • memory/884-135-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

    Filesize

    256KB

  • memory/1056-170-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1056-167-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1056-169-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1056-173-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1056-163-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1056-175-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/1056-176-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/1056-177-0x0000000000A80000-0x0000000001521000-memory.dmp

    Filesize

    10.6MB

  • memory/1056-166-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1056-172-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1056-164-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1056-157-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/1056-158-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/1056-159-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/1056-160-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/1056-161-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/1056-162-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1928-136-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB

  • memory/1928-122-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1928-132-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1928-130-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1928-128-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1928-124-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2032-54-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2032-56-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2032-57-0x0000000000400000-0x00000000016F9000-memory.dmp

    Filesize

    19.0MB

  • memory/2032-55-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2032-91-0x0000000061E00000-0x0000000061EF1000-memory.dmp

    Filesize

    964KB