Analysis

  • max time kernel
    1226s
  • max time network
    1231s
  • platform
    windows7_x64
  • resource
    win7-20230220-es
  • resource tags

    arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    10-05-2023 22:15

General

  • Target

    PassKey_55551_CompleteSetupV9.rar

  • Size

    14.9MB

  • MD5

    e9fd51eb223866cf2ef2bafc834cb21c

  • SHA1

    023e452807a4d020013b4addc74ec6156527a170

  • SHA256

    61c92c28313919a275926dccfb619e6d7a5b0ddc58cb9a532b6fce2a866b7c15

  • SHA512

    9595142d39638038fcd113ad63ffcbfebde3b82b44f9b2bd7a9030b9d8f750a23daec7384947e5e4282cadbb70d7cfc9e58c615cc868dea747c96fe787368c71

  • SSDEEP

    393216:lUPzaY+vYY1NwrnG5xLceNFsZtUURXSBbhp:l6exn1NwrnG1KvUn

Malware Config

Extracted

Family

raccoon

Botnet

ee2a3d190100b91c20d8bc284238dda6

C2

http://94.142.138.176/

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\PassKey_55551_CompleteSetupV9.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\PassKey_55551_CompleteSetupV9.rar
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:668
  • C:\Windows\system32\verclsid.exe
    "C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
    1⤵
      PID:1532
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\" -spe -an -ai#7zMap2444:116:7zEvent14229
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1340
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\" -spe -an -ai#7zMap22136:142:7zEvent10039
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1444
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4dc
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:188
    • C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe
      "C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Users\Admin\AppData\Roaming\oTZ6TIXu.exe
        "C:\Users\Admin\AppData\Roaming\oTZ6TIXu.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:524
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 5 /tn "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe"
          3⤵
          • Creates scheduled task(s)
          PID:1096
        • C:\Windows\SysWOW64\schtasks.exe
          /C /Query /XML /TN "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}"
          3⤵
            PID:2024
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {A7CB79EA-DA3C-43B0-93DA-CD480ED27EAB} S-1-5-21-1563773381-2037468142-1146002597-1000:YBHADZIG\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1200
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1764
          • C:\Windows\SysWOW64\schtasks.exe
            /C /create /F /sc minute /mo 5 /tn "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe"
            3⤵
            • Creates scheduled task(s)
            PID:2036

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe
        Filesize

        6.0MB

        MD5

        9e457e77d4717ae8594e268a1dbcdd2a

        SHA1

        bac83b7bccc008ff81794bfeb9aac0fa89ced6d9

        SHA256

        9e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6

        SHA512

        a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe
        Filesize

        6.0MB

        MD5

        9e457e77d4717ae8594e268a1dbcdd2a

        SHA1

        bac83b7bccc008ff81794bfeb9aac0fa89ced6d9

        SHA256

        9e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6

        SHA512

        a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe
        Filesize

        6.0MB

        MD5

        9e457e77d4717ae8594e268a1dbcdd2a

        SHA1

        bac83b7bccc008ff81794bfeb9aac0fa89ced6d9

        SHA256

        9e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6

        SHA512

        a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5

      • C:\Users\Admin\AppData\Roaming\oTZ6TIXu.exe
        Filesize

        6.0MB

        MD5

        9e457e77d4717ae8594e268a1dbcdd2a

        SHA1

        bac83b7bccc008ff81794bfeb9aac0fa89ced6d9

        SHA256

        9e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6

        SHA512

        a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5

      • C:\Users\Admin\AppData\Roaming\oTZ6TIXu.exe
        Filesize

        6.0MB

        MD5

        9e457e77d4717ae8594e268a1dbcdd2a

        SHA1

        bac83b7bccc008ff81794bfeb9aac0fa89ced6d9

        SHA256

        9e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6

        SHA512

        a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5

      • C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\Read.me.txt
        Filesize

        133B

        MD5

        6a61052326e39680aa408a73efff8a19

        SHA1

        74652794abe3f5ecd0b4a584dd4caeaf988b27cd

        SHA256

        b8f5a735bcbf64ecac278986f2293b11c88a889a3b9ba10a3bee22276b5ee461

        SHA512

        54b9dfd9a5647ac6b6fb934d86bef2cd0e3b6602acdc0e27bedc725eb62faaee0e697ccd37b113790c66860512171d2008c890b06a71ffb50f73f61e10edc195

      • C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile.rar
        Filesize

        14.9MB

        MD5

        0e51d7200aa6a2ece3b9c263de4dd3d4

        SHA1

        d60f9613d0b1970724b020c8de56b27639236d35

        SHA256

        c656c8eb82f761d11745bac3783b4400a178b3d4e8bc25b7447cbf439defafd3

        SHA512

        07c0e5c3f0484c02585cb0c45bcec498da6f41de87cfeff45a57f8a10dbc2ed1e7551ba554b91331eae223e5e6f4bd3042913d46e4f470cde4bdb7eda98ce4c6

      • C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\app\LICENSE.txt
        Filesize

        1KB

        MD5

        60a3c149b3893fc193db0ca111be5edc

        SHA1

        cad503fa4ce46d8f41e8036029113dff9bd10710

        SHA256

        d78528eb53898ff8fcf80986f87ae184c826cdea751d83fe90c5cf1e17142aa6

        SHA512

        948363eeda08b5395ca52ca49d5a47389ca4abe420a76f3625659b7e30bdc3b5fe37b7ce1a1012c861da3b8a05d5e5c0277d4ef6bee23a1a58d4189ab588ff93

      • C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe
        Filesize

        1190.2MB

        MD5

        bd70ceadc7da2a573d635390029424fe

        SHA1

        cdc42f3c6bf3ebee6a1090c535e07a45090b33f4

        SHA256

        78ecbbf5da44aa120680d595e16db322ecf6b9445f34b344718c95fe6dc03149

        SHA512

        32193c5de0535b2f75a1ba31a9150ef4f8af2396a26e452c6d377bda4b3301692ed0f32800b5b5589a11a0641b47a8005404a7a5b09437b8e4ae871670791975

      • C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe
        Filesize

        1190.2MB

        MD5

        bd70ceadc7da2a573d635390029424fe

        SHA1

        cdc42f3c6bf3ebee6a1090c535e07a45090b33f4

        SHA256

        78ecbbf5da44aa120680d595e16db322ecf6b9445f34b344718c95fe6dc03149

        SHA512

        32193c5de0535b2f75a1ba31a9150ef4f8af2396a26e452c6d377bda4b3301692ed0f32800b5b5589a11a0641b47a8005404a7a5b09437b8e4ae871670791975

      • \Users\Admin\AppData\LocalLow\mozglue.dll
        Filesize

        612KB

        MD5

        f07d9977430e762b563eaadc2b94bbfa

        SHA1

        da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

        SHA256

        4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

        SHA512

        6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

      • \Users\Admin\AppData\LocalLow\nss3.dll
        Filesize

        1.9MB

        MD5

        f67d08e8c02574cbc2f1122c53bfb976

        SHA1

        6522992957e7e4d074947cad63189f308a80fcf2

        SHA256

        c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

        SHA512

        2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

      • \Users\Admin\AppData\LocalLow\sqlite3.dll
        Filesize

        1.0MB

        MD5

        dbf4f8dcefb8056dc6bae4b67ff810ce

        SHA1

        bbac1dd8a07c6069415c04b62747d794736d0689

        SHA256

        47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

        SHA512

        b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

      • \Users\Admin\AppData\Roaming\oTZ6TIXu.exe
        Filesize

        6.0MB

        MD5

        9e457e77d4717ae8594e268a1dbcdd2a

        SHA1

        bac83b7bccc008ff81794bfeb9aac0fa89ced6d9

        SHA256

        9e703b2475022b4c5f264774fefb2395e7a66f49d4db7fda9c6c2efe4d45c7c6

        SHA512

        a082d619d934fd82586d4821197a8feff49cb138de6c402db7c5542616beb50f8285450df244f1305e2e0652e1dcaf854bd9c5e1d96e39a3dc55f710b7fce1a5

      • memory/524-635-0x0000000000400000-0x0000000000D62000-memory.dmp
        Filesize

        9.4MB

      • memory/524-630-0x0000000000240000-0x0000000000241000-memory.dmp
        Filesize

        4KB

      • memory/524-631-0x0000000000240000-0x0000000000241000-memory.dmp
        Filesize

        4KB

      • memory/524-632-0x0000000000250000-0x0000000000251000-memory.dmp
        Filesize

        4KB

      • memory/524-633-0x0000000000250000-0x0000000000251000-memory.dmp
        Filesize

        4KB

      • memory/524-634-0x0000000000250000-0x0000000000251000-memory.dmp
        Filesize

        4KB

      • memory/1128-569-0x0000000000320000-0x0000000000321000-memory.dmp
        Filesize

        4KB

      • memory/1128-576-0x0000000000340000-0x0000000000341000-memory.dmp
        Filesize

        4KB

      • memory/1128-567-0x0000000000310000-0x0000000000311000-memory.dmp
        Filesize

        4KB

      • memory/1128-572-0x0000000000330000-0x0000000000331000-memory.dmp
        Filesize

        4KB

      • memory/1128-611-0x0000000061E00000-0x0000000061EF1000-memory.dmp
        Filesize

        964KB

      • memory/1128-570-0x0000000000320000-0x0000000000321000-memory.dmp
        Filesize

        4KB

      • memory/1128-564-0x0000000000280000-0x0000000000281000-memory.dmp
        Filesize

        4KB

      • memory/1128-563-0x0000000000280000-0x0000000000281000-memory.dmp
        Filesize

        4KB

      • memory/1128-561-0x0000000000260000-0x0000000000261000-memory.dmp
        Filesize

        4KB

      • memory/1128-560-0x0000000000260000-0x0000000000261000-memory.dmp
        Filesize

        4KB

      • memory/1128-577-0x0000000000400000-0x0000000000DC0000-memory.dmp
        Filesize

        9.8MB

      • memory/1128-573-0x0000000000330000-0x0000000000331000-memory.dmp
        Filesize

        4KB

      • memory/1128-575-0x0000000000340000-0x0000000000341000-memory.dmp
        Filesize

        4KB

      • memory/1128-559-0x0000000000260000-0x0000000000261000-memory.dmp
        Filesize

        4KB

      • memory/1128-558-0x0000000000250000-0x0000000000251000-memory.dmp
        Filesize

        4KB

      • memory/1128-574-0x0000000000340000-0x0000000000341000-memory.dmp
        Filesize

        4KB

      • memory/1128-566-0x0000000000310000-0x0000000000311000-memory.dmp
        Filesize

        4KB

      • memory/1128-557-0x0000000000250000-0x0000000000251000-memory.dmp
        Filesize

        4KB

      • memory/1128-556-0x0000000000250000-0x0000000000251000-memory.dmp
        Filesize

        4KB

      • memory/1764-643-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/1764-647-0x0000000000240000-0x0000000000241000-memory.dmp
        Filesize

        4KB

      • memory/1764-646-0x0000000000240000-0x0000000000241000-memory.dmp
        Filesize

        4KB

      • memory/1764-644-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/1764-648-0x0000000000400000-0x0000000000D62000-memory.dmp
        Filesize

        9.4MB