Analysis

  • max time kernel
    51s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2023 21:03

General

  • Target

    jre-8u371-windows-i586.exe

  • Size

    56.9MB

  • MD5

    1b10be824ca0b2c31f43d296dc3df490

  • SHA1

    14970b5fec652d066d93a41b84a4361cd798f7bb

  • SHA256

    32eb91bc7933a1e99fb1416e60523ecfde0811e5cdeb74b7877f457bf6dfea3e

  • SHA512

    e7ba353cd2b3a460525c3c5f0c75f042d5208ddd5c3f61b9dfb38f43399160ac0e6f7264d29bdad653d84ea254e1d616b483fa778722d37dbba2824b2f99dc2e

  • SSDEEP

    786432:M5XmTHOmwqBSKNfVY7IU8eAISCuNdhy5NaYDZR8TQipFm4KhF+9cYdNwNkNrcZ:MoumZbNNun8vfbxERTipHdKYdCNk1s

Score
10/10

Malware Config

Extracted

Family

raccoon

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jre-8u371-windows-i586.exe
    "C:\Users\Admin\AppData\Local\Temp\jre-8u371-windows-i586.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\jds7083474.tmp\jre-8u371-windows-i586.exe
      "C:\Users\Admin\AppData\Local\Temp\jds7083474.tmp\jre-8u371-windows-i586.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:1252

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\jds7083474.tmp\jre-8u371-windows-i586.exe

    Filesize

    56.6MB

    MD5

    3861f5205fd11c1bc8e1e3c4303a646c

    SHA1

    522e7f7d69b9dee671c8b838a968adc69f1bf8bd

    SHA256

    9c4318199b9cf0ce4587ebb2ef6957445655d4a337d441505e6b1176669bd680

    SHA512

    41510e66ec594279175c38acf7f07353dfaacf6d7a9b0304d5d730a14b9851150748938866e73862ff1b1f778a9eebfaa6ccb88cd08ccc3f19e0b64d23e7fa76

  • C:\Users\Admin\AppData\Local\Temp\jds7083474.tmp\jre-8u371-windows-i586.exe

    Filesize

    56.6MB

    MD5

    3861f5205fd11c1bc8e1e3c4303a646c

    SHA1

    522e7f7d69b9dee671c8b838a968adc69f1bf8bd

    SHA256

    9c4318199b9cf0ce4587ebb2ef6957445655d4a337d441505e6b1176669bd680

    SHA512

    41510e66ec594279175c38acf7f07353dfaacf6d7a9b0304d5d730a14b9851150748938866e73862ff1b1f778a9eebfaa6ccb88cd08ccc3f19e0b64d23e7fa76

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    1KB

    MD5

    55d314537546b806c94749e3b26453b3

    SHA1

    bb8db427128ccc923b966aaab540698264993975

    SHA256

    5db49f444f1f2835df42523537fcfcf6424f4065317ef1d5eb9d29a3932a00dc

    SHA512

    a1cb27d0a86f743307a96f80ad3ceff450353f715a2fbd2c0565ef2e1b9140b2994cff10c90317ccb99a6c7f86714aa7f54b391fb6af999b4c19e32a5caf8fa2

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    3KB

    MD5

    8762d60f6a2ff6cd9a51a5e245ec1a06

    SHA1

    f8deb77f2cde4a85f34dd0aba6e64cbc6b1e80a2

    SHA256

    09626cfb1dc7bc7d907a9846db4160ac86d627a16e6eb2a46e160229bc48d23c

    SHA512

    c8cd9d7e6640ddf2aeac9ee2c4faaa22a763869047d4ea404e8adab639c0063f5de74ba94a13c3308acfb29d26aab2e95d8e9b78222956eea64fab5aea931f60

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    4KB

    MD5

    5257685a687478edb90b634ede6dcc42

    SHA1

    df99b4d8e8cc29f50fc1ace2f1cea11e72635194

    SHA256

    c42c66daeeb4db8571f977298ff9e3c07549fa0f6765dcd7146405fbe0fdfa53

    SHA512

    7bdd07512c8170cdaf423d3272191626f8a7e0a32d9b496855f8a7d8259640fa0c8783e07cf07aa2cb32567e5db0b6dfa9716e9669a38c2e6fb7a1bfaa6dfed3

  • \Users\Admin\AppData\Local\Temp\jds7083474.tmp\jre-8u371-windows-i586.exe

    Filesize

    56.6MB

    MD5

    3861f5205fd11c1bc8e1e3c4303a646c

    SHA1

    522e7f7d69b9dee671c8b838a968adc69f1bf8bd

    SHA256

    9c4318199b9cf0ce4587ebb2ef6957445655d4a337d441505e6b1176669bd680

    SHA512

    41510e66ec594279175c38acf7f07353dfaacf6d7a9b0304d5d730a14b9851150748938866e73862ff1b1f778a9eebfaa6ccb88cd08ccc3f19e0b64d23e7fa76