Analysis
-
max time kernel
1224s -
max time network
1229s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
10-05-2023 22:15
Static task
static1
Behavioral task
behavioral1
Sample
PassKey_55551_CompleteSetupV9.rar
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
PassKey_55551_CompleteSetupV9.rar
Resource
win10v2004-20230220-es
General
-
Target
PassKey_55551_CompleteSetupV9.rar
-
Size
14.9MB
-
MD5
e9fd51eb223866cf2ef2bafc834cb21c
-
SHA1
023e452807a4d020013b4addc74ec6156527a170
-
SHA256
61c92c28313919a275926dccfb619e6d7a5b0ddc58cb9a532b6fce2a866b7c15
-
SHA512
9595142d39638038fcd113ad63ffcbfebde3b82b44f9b2bd7a9030b9d8f750a23daec7384947e5e4282cadbb70d7cfc9e58c615cc868dea747c96fe787368c71
-
SSDEEP
393216:lUPzaY+vYY1NwrnG5xLceNFsZtUURXSBbhp:l6exn1NwrnG1KvUn
Malware Config
Extracted
raccoon
ee2a3d190100b91c20d8bc284238dda6
http://94.142.138.176/
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
setup.exepid process 4136 setup.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe vmprotect C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe vmprotect behavioral2/memory/4136-617-0x0000000000400000-0x0000000000DC0000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
setup.exepid process 4136 setup.exe 4136 setup.exe 4136 setup.exe 4136 setup.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
7zG.exe7zG.exedescription pid process Token: SeRestorePrivilege 4396 7zG.exe Token: 35 4396 7zG.exe Token: SeSecurityPrivilege 4396 7zG.exe Token: SeSecurityPrivilege 4396 7zG.exe Token: SeRestorePrivilege 3444 7zG.exe Token: 35 3444 7zG.exe Token: SeSecurityPrivilege 3444 7zG.exe Token: SeSecurityPrivilege 3444 7zG.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zG.exe7zG.exepid process 4396 7zG.exe 3444 7zG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3564 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PassKey_55551_CompleteSetupV9.rar1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\" -spe -an -ai#7zMap3766:116:7zEvent205691⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\" -spe -an -ai#7zMap25195:142:7zEvent21081⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe"C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile.rarFilesize
14.9MB
MD50e51d7200aa6a2ece3b9c263de4dd3d4
SHA1d60f9613d0b1970724b020c8de56b27639236d35
SHA256c656c8eb82f761d11745bac3783b4400a178b3d4e8bc25b7447cbf439defafd3
SHA51207c0e5c3f0484c02585cb0c45bcec498da6f41de87cfeff45a57f8a10dbc2ed1e7551ba554b91331eae223e5e6f4bd3042913d46e4f470cde4bdb7eda98ce4c6
-
C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exeFilesize
1190.2MB
MD5bd70ceadc7da2a573d635390029424fe
SHA1cdc42f3c6bf3ebee6a1090c535e07a45090b33f4
SHA25678ecbbf5da44aa120680d595e16db322ecf6b9445f34b344718c95fe6dc03149
SHA51232193c5de0535b2f75a1ba31a9150ef4f8af2396a26e452c6d377bda4b3301692ed0f32800b5b5589a11a0641b47a8005404a7a5b09437b8e4ae871670791975
-
C:\Users\Admin\Desktop\PassKey_55551_CompleteSetupV9\SoftwareFile\setup.exeFilesize
1190.2MB
MD5bd70ceadc7da2a573d635390029424fe
SHA1cdc42f3c6bf3ebee6a1090c535e07a45090b33f4
SHA25678ecbbf5da44aa120680d595e16db322ecf6b9445f34b344718c95fe6dc03149
SHA51232193c5de0535b2f75a1ba31a9150ef4f8af2396a26e452c6d377bda4b3301692ed0f32800b5b5589a11a0641b47a8005404a7a5b09437b8e4ae871670791975
-
memory/4136-610-0x0000000000F20000-0x0000000000F21000-memory.dmpFilesize
4KB
-
memory/4136-612-0x0000000000F50000-0x0000000000F51000-memory.dmpFilesize
4KB
-
memory/4136-615-0x0000000000F90000-0x0000000000F91000-memory.dmpFilesize
4KB
-
memory/4136-614-0x0000000000F80000-0x0000000000F81000-memory.dmpFilesize
4KB
-
memory/4136-613-0x0000000000F60000-0x0000000000F61000-memory.dmpFilesize
4KB
-
memory/4136-611-0x0000000000F30000-0x0000000000F31000-memory.dmpFilesize
4KB
-
memory/4136-616-0x0000000000FA0000-0x0000000000FA1000-memory.dmpFilesize
4KB
-
memory/4136-617-0x0000000000400000-0x0000000000DC0000-memory.dmpFilesize
9.8MB