Analysis
-
max time kernel
971s -
max time network
1228s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
10-05-2023 22:15
Static task
static1
Behavioral task
behavioral1
Sample
PassKey-55551-CompleteFileV8.rar
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
PassKey-55551-CompleteFileV8.rar
Resource
win10v2004-20230220-es
General
-
Target
PassKey-55551-CompleteFileV8.rar
-
Size
14.9MB
-
MD5
00de82c2721f4d97f728febbc4758036
-
SHA1
528eb4965630e9d051f2c2b3a9ffe6ddb78ffe75
-
SHA256
3099f11a5d7e56fd714b21b76b411de53348237257938be932ed3d4e084d487d
-
SHA512
0b9ad8446b9e06215f671875f7b845b6aaf0b3abc45b9ed022922f3a771ccfdfd97486f7d4b4188431b421076e79501b14b1b37e73e4df9076032694a6df1253
-
SSDEEP
393216:wLq2Hr2ghmHDNHhxhfSXMcgyI8cQWWoPBJl:wLq2SZj5D5Sc0cZW0J
Malware Config
Extracted
raccoon
ee2a3d190100b91c20d8bc284238dda6
http://94.142.138.176/
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
setup.exepid process 3936 setup.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\PassKey-55551-CompleteFileV8\SoftwareSetup\setup.exe vmprotect C:\Users\Admin\Desktop\PassKey-55551-CompleteFileV8\SoftwareSetup\setup.exe vmprotect behavioral2/memory/3936-617-0x0000000000400000-0x0000000000DC0000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
setup.exepid process 3936 setup.exe 3936 setup.exe 3936 setup.exe 3936 setup.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
7zG.exe7zG.exedescription pid process Token: SeRestorePrivilege 3580 7zG.exe Token: 35 3580 7zG.exe Token: SeSecurityPrivilege 3580 7zG.exe Token: SeSecurityPrivilege 3580 7zG.exe Token: SeRestorePrivilege 3992 7zG.exe Token: 35 3992 7zG.exe Token: SeSecurityPrivilege 3992 7zG.exe Token: SeSecurityPrivilege 3992 7zG.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zG.exe7zG.exepid process 3580 7zG.exe 3992 7zG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4344 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PassKey-55551-CompleteFileV8.rar1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\PassKey-55551-CompleteFileV8\" -spe -an -ai#7zMap29013:114:7zEvent254821⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\PassKey-55551-CompleteFileV8\SoftwareSetup\" -spe -an -ai#7zMap2541:142:7zEvent143111⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Desktop\PassKey-55551-CompleteFileV8\SoftwareSetup\setup.exe"C:\Users\Admin\Desktop\PassKey-55551-CompleteFileV8\SoftwareSetup\setup.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\PassKey-55551-CompleteFileV8\SoftwareSetup.rarFilesize
14.9MB
MD55174ee0c38ddd30697eb4dfbfdb2cc59
SHA1e21452bda1b5c4e8465b4078ddff112f25d64719
SHA256e56546d647a97c405d8676cd8ba015e837712a672f543d03b5483150e3a25bb6
SHA512edf53b0178f7d64c65bf1a1e44d849ea0494ac6dec45ba97afc3671557f606074bfd7fb0dae69aee6f4219a8feee5ec9c99d3ebf969a01ecbe63c0064cbcff14
-
C:\Users\Admin\Desktop\PassKey-55551-CompleteFileV8\SoftwareSetup\setup.exeFilesize
1190.2MB
MD5bd70ceadc7da2a573d635390029424fe
SHA1cdc42f3c6bf3ebee6a1090c535e07a45090b33f4
SHA25678ecbbf5da44aa120680d595e16db322ecf6b9445f34b344718c95fe6dc03149
SHA51232193c5de0535b2f75a1ba31a9150ef4f8af2396a26e452c6d377bda4b3301692ed0f32800b5b5589a11a0641b47a8005404a7a5b09437b8e4ae871670791975
-
C:\Users\Admin\Desktop\PassKey-55551-CompleteFileV8\SoftwareSetup\setup.exeFilesize
1190.2MB
MD5bd70ceadc7da2a573d635390029424fe
SHA1cdc42f3c6bf3ebee6a1090c535e07a45090b33f4
SHA25678ecbbf5da44aa120680d595e16db322ecf6b9445f34b344718c95fe6dc03149
SHA51232193c5de0535b2f75a1ba31a9150ef4f8af2396a26e452c6d377bda4b3301692ed0f32800b5b5589a11a0641b47a8005404a7a5b09437b8e4ae871670791975
-
memory/3936-610-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/3936-611-0x0000000000E60000-0x0000000000E61000-memory.dmpFilesize
4KB
-
memory/3936-614-0x0000000001070000-0x0000000001071000-memory.dmpFilesize
4KB
-
memory/3936-612-0x0000000000E80000-0x0000000000E81000-memory.dmpFilesize
4KB
-
memory/3936-615-0x0000000001080000-0x0000000001081000-memory.dmpFilesize
4KB
-
memory/3936-613-0x0000000000E90000-0x0000000000E91000-memory.dmpFilesize
4KB
-
memory/3936-616-0x0000000001090000-0x0000000001091000-memory.dmpFilesize
4KB
-
memory/3936-617-0x0000000000400000-0x0000000000DC0000-memory.dmpFilesize
9.8MB