Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2023 01:12

General

  • Target

    792f7b6362d213e5976d71aea0f36488aae184b30e021210e847d1450546c39d.exe

  • Size

    489KB

  • MD5

    35e7110e47ba3d42bf5b71937e02ce8b

  • SHA1

    7194f08ad122d5e2e1d7b432522d6e9fc2565d7b

  • SHA256

    792f7b6362d213e5976d71aea0f36488aae184b30e021210e847d1450546c39d

  • SHA512

    70020e4680f74fd17705b14b0cc11541c773844952ee211eda82291b49b07c94acae9a7aa406c0f6e41fbad4a54d7ff10432b0acb0b2bbf5bc66201b8c6aec43

  • SSDEEP

    12288:qimcuTGiqcyQoiAsxhfi+/wHKK8zsK/nn6F2oG:qimcUGiqcyuAoh6jHKRzsKvQ23

Score
10/10

Malware Config

Extracted

Family

raccoon

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\792f7b6362d213e5976d71aea0f36488aae184b30e021210e847d1450546c39d.exe
    "C:\Users\Admin\AppData\Local\Temp\792f7b6362d213e5976d71aea0f36488aae184b30e021210e847d1450546c39d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ExecutionPolicy Bypass -F C:/ProgramData/md9fmn2uj52E8Ut8f5xmiH0j4abpph3A.ps1
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4196
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start C:/ProgramData/readerdc64_fr_xa_mdr_install.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\ProgramData\readerdc64_fr_xa_mdr_install.exe
          C:/ProgramData/readerdc64_fr_xa_mdr_install.exe
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4472
          • C:\Users\Admin\AppData\Local\Adobe\5097F3EA-B8A3-449D-8A3D-408B92D74F2C\83FA450E-7F1B-4F5E-BFFD-CD14C008B10C\3E23EC7D-C962-478D-9566-886C38F7D8A7
            "C:\Users\Admin\AppData\Local\Adobe\5097F3EA-B8A3-449D-8A3D-408B92D74F2C\83FA450E-7F1B-4F5E-BFFD-CD14C008B10C\3E23EC7D-C962-478D-9566-886C38F7D8A7" /sAll /re /msi PRODUCT_SOURCE=ACDC OWNERSHIP_STATE=1 UPDATE_MODE=3 EULA_ACCEPT=YES
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Adobe\Temp\24047\config.bin

    Filesize

    3KB

    MD5

    e4256e1d4e606d42d70998ea97594a81

    SHA1

    b14d81a3d6b4300043189c7e8d303c39eabf640c

    SHA256

    91f8bf30b1bb1dcac29f58c578e5dcafa1d762095a1152f4c95d42d1a6a261e5

    SHA512

    c705e022a3b3e49295e47d54b84771d8c8863862154cd36acb4e17820c30fadaf922eff56e39a0b118418d4f44a8c7ce7a910507994438ea865b6678df543f0f

  • C:\ProgramData\md9fmn2uj52E8Ut8f5xmiH0j4abpph3A.ps1

    Filesize

    25KB

    MD5

    e8c3e078f9a6d9efa1391687a983ffae

    SHA1

    f5e0b299465164cd1745ab5153d98ceb66b465f4

    SHA256

    9d1c391c7730878897d9c03c5f2ab09a7428293bcf058346eaeb6c617e0e7289

    SHA512

    566bd10fae840974ce4214d4d7247afd62891780af7dc75a7e3f0b1ad849e2ebea44318280e188149268371a31975b711abfd3f72949a43018b5b0c66620a9cd

  • C:\ProgramData\readerdc64_fr_xa_mdr_install.exe

    Filesize

    1.3MB

    MD5

    4dce9a0afd4a43f7a21896f50aa2b442

    SHA1

    f915dad6ebd4276518f7d962619a3c4612b76be0

    SHA256

    e939a53fe11b0d32d9ee617f92d48fc4b409516d5c5ecfe4599a6c64d7fb1241

    SHA512

    daf5a5e4b0601f8f0b29f8292b659be41a79d7045fe0b9ffa8b71df966aac01ef5d29bcec2be4aee233926976f8708f6bb86f4639e4ee08368ac9909bfac7290

  • C:\ProgramData\readerdc64_fr_xa_mdr_install.exe

    Filesize

    1.3MB

    MD5

    4dce9a0afd4a43f7a21896f50aa2b442

    SHA1

    f915dad6ebd4276518f7d962619a3c4612b76be0

    SHA256

    e939a53fe11b0d32d9ee617f92d48fc4b409516d5c5ecfe4599a6c64d7fb1241

    SHA512

    daf5a5e4b0601f8f0b29f8292b659be41a79d7045fe0b9ffa8b71df966aac01ef5d29bcec2be4aee233926976f8708f6bb86f4639e4ee08368ac9909bfac7290

  • C:\Users\Admin\AppData\Local\Adobe\5097F3EA-B8A3-449D-8A3D-408B92D74F2C\83FA450E-7F1B-4F5E-BFFD-CD14C008B10C\3E23EC7D-C962-478D-9566-886C38F7D8A7

    Filesize

    100.7MB

    MD5

    c7da53050e7101bef23912f0bba29e4e

    SHA1

    978307107d98987f9745135ce5594d4305dcdadf

    SHA256

    c8f6313d1066d9fbd12dfd5ddc00efc826c1a11f11a006306167b95590bc4ffb

    SHA512

    03e090b5e77c2931a30121265f63b6953182d82b344eefa8375ebe457f520bfdec276545b3608615cd6deb37bf33a4c9f52ad451a51dad9cb45f800a6207818f

  • C:\Users\Admin\AppData\Local\Adobe\5097F3EA-B8A3-449D-8A3D-408B92D74F2C\83FA450E-7F1B-4F5E-BFFD-CD14C008B10C\3E23EC7D-C962-478D-9566-886C38F7D8A7

    Filesize

    100.3MB

    MD5

    7d4f8fadeabdd53b975c4b1355b7162f

    SHA1

    710132680c11eda17d38edfefd9203966c461ba2

    SHA256

    f5df47c3d1221a81181599ef8aed606658511e056231b69a7d987016b0e310ff

    SHA512

    4e99e6769b3495eed8e0904c70a12866c178b4082787d10dda7067454e2cd6447ba23c8d27ee64ea42d3a74af5dee42f11bbceae68f607d9bc8226009c3eb71d

  • C:\Users\Admin\AppData\Local\Adobe\5097F3EA-B8A3-449D-8A3D-408B92D74F2C\progressbar_blue_active_100.png

    Filesize

    14KB

    MD5

    bb94a177f10bf764d11f94d24a5db5aa

    SHA1

    6864b58952b19248f4c5ea5c8764c52e207268a7

    SHA256

    caafea31074ba909ec57c9dcdd1b1c0256e5626939cc768b8a041fe42762e230

    SHA512

    d2875eb5ad9ff76ff233ada04fa77aecdbb0c9a80bcd85b0c50087786b47e97feec189d18164e15784cd96850849ee4e1920d7d98157ca7ad317ba03e8c66111

  • C:\Users\Admin\AppData\Local\Temp\Adobe_ADMLogs\Adobe_GDE.log

    Filesize

    390B

    MD5

    0a5ce85167bb47e34267e786e642febc

    SHA1

    c6f52a63913534db5bd34596944bb8bc4eebbe05

    SHA256

    0cdb528b65d803330077f353f123830b265f30294e766372f6a5f0257b8272fe

    SHA512

    93a66d7f903f55d6ebd6e68c4c1caefa1690d88db5d779adfc12fe72ea757d5cf449ed28cb9d87eecb49047be33d936e2ed6943d49e6f9d3a3ed54a4bdc51920

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zegwmd1f.43b.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/4196-200-0x0000023E76010000-0x0000023E76020000-memory.dmp

    Filesize

    64KB

  • memory/4196-139-0x0000023E78090000-0x0000023E780B2000-memory.dmp

    Filesize

    136KB

  • memory/4196-199-0x0000023E76010000-0x0000023E76020000-memory.dmp

    Filesize

    64KB

  • memory/4196-146-0x0000023E76010000-0x0000023E76020000-memory.dmp

    Filesize

    64KB

  • memory/4196-145-0x0000023E76010000-0x0000023E76020000-memory.dmp

    Filesize

    64KB

  • memory/4472-216-0x0000000000AE0000-0x0000000000EC2000-memory.dmp

    Filesize

    3.9MB

  • memory/4472-219-0x0000000000AE0000-0x0000000000EC2000-memory.dmp

    Filesize

    3.9MB

  • memory/4472-221-0x0000000000AE0000-0x0000000000EC2000-memory.dmp

    Filesize

    3.9MB

  • memory/4472-232-0x0000000000AE0000-0x0000000000EC2000-memory.dmp

    Filesize

    3.9MB

  • memory/4472-150-0x0000000000AE0000-0x0000000000EC2000-memory.dmp

    Filesize

    3.9MB

  • memory/4472-258-0x0000000000AE0000-0x0000000000EC2000-memory.dmp

    Filesize

    3.9MB