Analysis
-
max time kernel
1228s -
max time network
1233s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
10-05-2023 22:15
Static task
static1
Behavioral task
behavioral1
Sample
Use_2024_As_Passw0rd.rar
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
Use_2024_As_Passw0rd.rar
Resource
win10v2004-20230221-es
General
-
Target
Use_2024_As_Passw0rd.rar
-
Size
14.5MB
-
MD5
564c2166383b77531e66ca6afcd08363
-
SHA1
11ed086b024681df2a938a90d34bdd77c43fbec3
-
SHA256
5352ad7b62ac6a38bf4997ef0934c6cbb5c3c38bf71607bc309db3196ac20e02
-
SHA512
d7fdaf322ebd8027a35558996097e5691f3bc3570dc657b26d88e304d93b7e557340c8b3b9e6ec6fe23b5edc2cefad6b7a0a631c9552958779d351802048ff3b
-
SSDEEP
393216:6VTmXsw7XdOnCBOZqeztOHzTUgNxuIhjgGqLt2:EaXswhOCg80tkzTp/uSt/
Malware Config
Extracted
raccoon
1a02d3cb5468c8755bd1609c6c7a04ad
http://37.220.87.68
http://83.217.11.14
http://94.142.138.125/
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
+Setup.exepid process 1568 +Setup.exe -
Loads dropped DLL 3 IoCs
Processes:
+Setup.exepid process 1568 +Setup.exe 1568 +Setup.exe 1568 +Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
+Setup.exepid process 1568 +Setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zG.exepid process 1868 7zG.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
7zG.exe7zG.exedescription pid process Token: SeRestorePrivilege 1868 7zG.exe Token: 35 1868 7zG.exe Token: SeSecurityPrivilege 1868 7zG.exe Token: SeSecurityPrivilege 1868 7zG.exe Token: SeRestorePrivilege 796 7zG.exe Token: 35 796 7zG.exe Token: SeSecurityPrivilege 796 7zG.exe Token: SeSecurityPrivilege 796 7zG.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zG.exe7zG.exepid process 1868 7zG.exe 796 7zG.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 864 wrote to memory of 1624 864 cmd.exe rundll32.exe PID 864 wrote to memory of 1624 864 cmd.exe rundll32.exe PID 864 wrote to memory of 1624 864 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Use_2024_As_Passw0rd.rar1⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Use_2024_As_Passw0rd.rar2⤵
- Modifies registry class
PID:1624
-
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵PID:1324
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Use_2024_As_Passw0rd\" -spe -an -ai#7zMap16692:98:7zEvent191041⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1868
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Use_2024_As_Passw0rd\" -spe -an -ai#7zMap27224:98:7zEvent176781⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:796
-
C:\Users\Admin\Desktop\Use_2024_As_Passw0rd\+Setup.exe"C:\Users\Admin\Desktop\Use_2024_As_Passw0rd\+Setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1691.1MB
MD5b83b6f1697e2ecbb87dcae477e9d9a22
SHA1eedf7337aca40983a4a0e34f3fe15cbad7b8f081
SHA256306d942f8ecf8bcfa6bc76168335f708dbe83690fad1f84cb0da28f640f1d8ac
SHA512947c4110fdea839992c779a574286314632d3463e12fc18ce2eacee1eb6020065254b6af4252bda76fb7c8c8c0d2f12971d7627fad589fb963eebef35b4253ed
-
Filesize
1691.1MB
MD5b83b6f1697e2ecbb87dcae477e9d9a22
SHA1eedf7337aca40983a4a0e34f3fe15cbad7b8f081
SHA256306d942f8ecf8bcfa6bc76168335f708dbe83690fad1f84cb0da28f640f1d8ac
SHA512947c4110fdea839992c779a574286314632d3463e12fc18ce2eacee1eb6020065254b6af4252bda76fb7c8c8c0d2f12971d7627fad589fb963eebef35b4253ed
-
Filesize
1691.1MB
MD5b83b6f1697e2ecbb87dcae477e9d9a22
SHA1eedf7337aca40983a4a0e34f3fe15cbad7b8f081
SHA256306d942f8ecf8bcfa6bc76168335f708dbe83690fad1f84cb0da28f640f1d8ac
SHA512947c4110fdea839992c779a574286314632d3463e12fc18ce2eacee1eb6020065254b6af4252bda76fb7c8c8c0d2f12971d7627fad589fb963eebef35b4253ed
-
Filesize
1691.1MB
MD5b83b6f1697e2ecbb87dcae477e9d9a22
SHA1eedf7337aca40983a4a0e34f3fe15cbad7b8f081
SHA256306d942f8ecf8bcfa6bc76168335f708dbe83690fad1f84cb0da28f640f1d8ac
SHA512947c4110fdea839992c779a574286314632d3463e12fc18ce2eacee1eb6020065254b6af4252bda76fb7c8c8c0d2f12971d7627fad589fb963eebef35b4253ed
-
Filesize
1691.1MB
MD5b83b6f1697e2ecbb87dcae477e9d9a22
SHA1eedf7337aca40983a4a0e34f3fe15cbad7b8f081
SHA256306d942f8ecf8bcfa6bc76168335f708dbe83690fad1f84cb0da28f640f1d8ac
SHA512947c4110fdea839992c779a574286314632d3463e12fc18ce2eacee1eb6020065254b6af4252bda76fb7c8c8c0d2f12971d7627fad589fb963eebef35b4253ed