Analysis
-
max time kernel
1226s -
max time network
1231s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
10-05-2023 22:15
Static task
static1
Behavioral task
behavioral1
Sample
PassKey_55551_CompleteSetupV9.rar
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
PassKey_55551_CompleteSetupV9.rar
Resource
win10v2004-20230220-es
General
-
Target
PassKey_55551_CompleteSetupV9.rar
-
Size
14.9MB
-
MD5
e9fd51eb223866cf2ef2bafc834cb21c
-
SHA1
023e452807a4d020013b4addc74ec6156527a170
-
SHA256
61c92c28313919a275926dccfb619e6d7a5b0ddc58cb9a532b6fce2a866b7c15
-
SHA512
9595142d39638038fcd113ad63ffcbfebde3b82b44f9b2bd7a9030b9d8f750a23daec7384947e5e4282cadbb70d7cfc9e58c615cc868dea747c96fe787368c71
-
SSDEEP
393216:lUPzaY+vYY1NwrnG5xLceNFsZtUURXSBbhp:l6exn1NwrnG1KvUn
Malware Config
Extracted
raccoon
ee2a3d190100b91c20d8bc284238dda6
http://94.142.138.176/
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
setup.exeoTZ6TIXu.exeTSTheme.exepid process 1128 setup.exe 524 oTZ6TIXu.exe 1764 TSTheme.exe -
Loads dropped DLL 4 IoCs
Processes:
setup.exepid process 1128 setup.exe 1128 setup.exe 1128 setup.exe 1128 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe vmprotect C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe vmprotect behavioral1/memory/1128-577-0x0000000000400000-0x0000000000DC0000-memory.dmp vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
oTZ6TIXu.exeTSTheme.exepid process 524 oTZ6TIXu.exe 524 oTZ6TIXu.exe 1764 TSTheme.exe 1764 TSTheme.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1096 schtasks.exe 2036 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
setup.exeoTZ6TIXu.exeTSTheme.exepid process 1128 setup.exe 1128 setup.exe 524 oTZ6TIXu.exe 1764 TSTheme.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid process 668 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
7zG.exe7zG.exeAUDIODG.EXEdescription pid process Token: SeRestorePrivilege 1340 7zG.exe Token: 35 1340 7zG.exe Token: SeSecurityPrivilege 1340 7zG.exe Token: SeSecurityPrivilege 1340 7zG.exe Token: SeRestorePrivilege 1444 7zG.exe Token: 35 1444 7zG.exe Token: SeSecurityPrivilege 1444 7zG.exe Token: SeSecurityPrivilege 1444 7zG.exe Token: 33 188 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 188 AUDIODG.EXE Token: 33 188 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 188 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zG.exe7zG.exepid process 1340 7zG.exe 1444 7zG.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
cmd.exesetup.exeoTZ6TIXu.exetaskeng.exeTSTheme.exedescription pid process target process PID 1124 wrote to memory of 668 1124 cmd.exe rundll32.exe PID 1124 wrote to memory of 668 1124 cmd.exe rundll32.exe PID 1124 wrote to memory of 668 1124 cmd.exe rundll32.exe PID 1128 wrote to memory of 524 1128 setup.exe oTZ6TIXu.exe PID 1128 wrote to memory of 524 1128 setup.exe oTZ6TIXu.exe PID 1128 wrote to memory of 524 1128 setup.exe oTZ6TIXu.exe PID 1128 wrote to memory of 524 1128 setup.exe oTZ6TIXu.exe PID 524 wrote to memory of 1096 524 oTZ6TIXu.exe schtasks.exe PID 524 wrote to memory of 1096 524 oTZ6TIXu.exe schtasks.exe PID 524 wrote to memory of 1096 524 oTZ6TIXu.exe schtasks.exe PID 524 wrote to memory of 1096 524 oTZ6TIXu.exe schtasks.exe PID 524 wrote to memory of 2024 524 oTZ6TIXu.exe schtasks.exe PID 524 wrote to memory of 2024 524 oTZ6TIXu.exe schtasks.exe PID 524 wrote to memory of 2024 524 oTZ6TIXu.exe schtasks.exe PID 524 wrote to memory of 2024 524 oTZ6TIXu.exe schtasks.exe PID 1200 wrote to memory of 1764 1200 taskeng.exe TSTheme.exe PID 1200 wrote to memory of 1764 1200 taskeng.exe TSTheme.exe PID 1200 wrote to memory of 1764 1200 taskeng.exe TSTheme.exe PID 1200 wrote to memory of 1764 1200 taskeng.exe TSTheme.exe PID 1764 wrote to memory of 2036 1764 TSTheme.exe schtasks.exe PID 1764 wrote to memory of 2036 1764 TSTheme.exe schtasks.exe PID 1764 wrote to memory of 2036 1764 TSTheme.exe schtasks.exe PID 1764 wrote to memory of 2036 1764 TSTheme.exe schtasks.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PassKey_55551_CompleteSetupV9.rar1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\PassKey_55551_CompleteSetupV9.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\" -spe -an -ai#7zMap2444:116:7zEvent142291⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\" -spe -an -ai#7zMap22136:142:7zEvent100391⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4dc1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe"C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\oTZ6TIXu.exe"C:\Users\Admin\AppData\Roaming\oTZ6TIXu.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}"3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {A7CB79EA-DA3C-43B0-93DA-CD480ED27EAB} S-1-5-21-1563773381-2037468142-1146002597-1000:YBHADZIG\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exeFilesize
6.0MB
MD59e457e77d4717ae8594e268a1dbcdd2a
SHA1bac83b7bccc008ff81794bfeb9aac0fa89ced6d9
SHA2569e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6
SHA512a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exeFilesize
6.0MB
MD59e457e77d4717ae8594e268a1dbcdd2a
SHA1bac83b7bccc008ff81794bfeb9aac0fa89ced6d9
SHA2569e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6
SHA512a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exeFilesize
6.0MB
MD59e457e77d4717ae8594e268a1dbcdd2a
SHA1bac83b7bccc008ff81794bfeb9aac0fa89ced6d9
SHA2569e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6
SHA512a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5
-
C:\Users\Admin\AppData\Roaming\oTZ6TIXu.exeFilesize
6.0MB
MD59e457e77d4717ae8594e268a1dbcdd2a
SHA1bac83b7bccc008ff81794bfeb9aac0fa89ced6d9
SHA2569e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6
SHA512a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5
-
C:\Users\Admin\AppData\Roaming\oTZ6TIXu.exeFilesize
6.0MB
MD59e457e77d4717ae8594e268a1dbcdd2a
SHA1bac83b7bccc008ff81794bfeb9aac0fa89ced6d9
SHA2569e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6
SHA512a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5
-
C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\Read.me.txtFilesize
133B
MD56a61052326e39680aa408a73efff8a19
SHA174652794abe3f5ecd0b4a584dd4caeaf988b27cd
SHA256b8f5a735bcbf64ecac278986f2293b11c88a889a3b9ba10a3bee22276b5ee461
SHA51254b9dfd9a5647ac6b6fb934d86bef2cd0e3b6602acdc0e27bedc725eb62faaee0e697ccd37b113790c66860512171d2008c890b06a71ffb50f73f61e10edc195
-
C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile.rarFilesize
14.9MB
MD50e51d7200aa6a2ece3b9c263de4dd3d4
SHA1d60f9613d0b1970724b020c8de56b27639236d35
SHA256c656c8eb82f761d11745bac3783b4400a178b3d4e8bc25b7447cbf439defafd3
SHA51207c0e5c3f0484c02585cb0c45bcec498da6f41de87cfeff45a57f8a10dbc2ed1e7551ba554b91331eae223e5e6f4bd3042913d46e4f470cde4bdb7eda98ce4c6
-
C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\app\LICENSE.txtFilesize
1KB
MD560a3c149b3893fc193db0ca111be5edc
SHA1cad503fa4ce46d8f41e8036029113dff9bd10710
SHA256d78528eb53898ff8fcf80986f87ae184c826cdea751d83fe90c5cf1e17142aa6
SHA512948363eeda08b5395ca52ca49d5a47389ca4abe420a76f3625659b7e30bdc3b5fe37b7ce1a1012c861da3b8a05d5e5c0277d4ef6bee23a1a58d4189ab588ff93
-
C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exeFilesize
1190.2MB
MD5bd70ceadc7da2a573d635390029424fe
SHA1cdc42f3c6bf3ebee6a1090c535e07a45090b33f4
SHA25678ecbbf5da44aa120680d595e16db322ecf6b9445f34b344718c95fe6dc03149
SHA51232193c5de0535b2f75a1ba31a9150ef4f8af2396a26e452c6d377bda4b3301692ed0f32800b5b5589a11a0641b47a8005404a7a5b09437b8e4ae871670791975
-
C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exeFilesize
1190.2MB
MD5bd70ceadc7da2a573d635390029424fe
SHA1cdc42f3c6bf3ebee6a1090c535e07a45090b33f4
SHA25678ecbbf5da44aa120680d595e16db322ecf6b9445f34b344718c95fe6dc03149
SHA51232193c5de0535b2f75a1ba31a9150ef4f8af2396a26e452c6d377bda4b3301692ed0f32800b5b5589a11a0641b47a8005404a7a5b09437b8e4ae871670791975
-
\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
\Users\Admin\AppData\Roaming\oTZ6TIXu.exeFilesize
6.0MB
MD59e457e77d4717ae8594e268a1dbcdd2a
SHA1bac83b7bccc008ff81794bfeb9aac0fa89ced6d9
SHA2569e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6
SHA512a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5
-
memory/524-635-0x0000000000400000-0x0000000000D62000-memory.dmpFilesize
9.4MB
-
memory/524-630-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/524-631-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/524-632-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/524-633-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/524-634-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1128-569-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB
-
memory/1128-576-0x0000000000340000-0x0000000000341000-memory.dmpFilesize
4KB
-
memory/1128-567-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/1128-572-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/1128-611-0x0000000061E00000-0x0000000061EF1000-memory.dmpFilesize
964KB
-
memory/1128-570-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB
-
memory/1128-564-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/1128-563-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/1128-561-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/1128-560-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/1128-577-0x0000000000400000-0x0000000000DC0000-memory.dmpFilesize
9.8MB
-
memory/1128-573-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/1128-575-0x0000000000340000-0x0000000000341000-memory.dmpFilesize
4KB
-
memory/1128-559-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/1128-558-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1128-574-0x0000000000340000-0x0000000000341000-memory.dmpFilesize
4KB
-
memory/1128-566-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/1128-557-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1128-556-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1764-643-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1764-647-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1764-646-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1764-644-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1764-648-0x0000000000400000-0x0000000000D62000-memory.dmpFilesize
9.4MB