Resubmissions

13-06-2023 14:23

230613-rqmzragf66 10

13-06-2023 14:10

230613-rg3zlsge64 10

13-06-2023 02:06

230613-cjr8kafa5x 10

Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2023 02:06

General

  • Target

    d872fbe973a4799e94f57abdc594b37e.exe

  • Size

    475KB

  • MD5

    d872fbe973a4799e94f57abdc594b37e

  • SHA1

    b16837fd4ce58947536360e301e985c7d37d6b1c

  • SHA256

    11e3923cc252bb9022a41a9f5b73672ea8b0798e4492e603ac088d913d7c80c0

  • SHA512

    772f155b664316993bfaa04f4fdf54d9f0b41f7a11ecb39bf7a9409f7afecf612f1ebdf2df7ef548b967291edee1e639d723b6e4c16fc0b36be414e45ac2d53f

  • SSDEEP

    6144:w9TKnLFNE2Dg5PjGnBEYfzTFYIKwstHLzizUblgFBNc3d2RohDAF:w9TKDyxYfz5mwCH/iclgFBGNSoy

Score
10/10

Malware Config

Extracted

Family

raccoon

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d872fbe973a4799e94f57abdc594b37e.exe
    "C:\Users\Admin\AppData\Local\Temp\d872fbe973a4799e94f57abdc594b37e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ExecutionPolicy Bypass -F C:/ProgramData/md9fmn2uj52E8Ut8f5xmiH0j4abpph3A.ps1
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3164
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start C:/ProgramData/readerdc64_fr_xa_mdr_install.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\ProgramData\readerdc64_fr_xa_mdr_install.exe
          C:/ProgramData/readerdc64_fr_xa_mdr_install.exe
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2768
          • C:\Users\Admin\AppData\Local\Adobe\FC0DB5E6-4B45-4A99-AB08-0F00E4FCC8DE\DAC90326-BD6A-4760-BB5A-1EC19EDE1757\5AA70B6A-8170-4838-AE55-8418EAB418EA
            "C:\Users\Admin\AppData\Local\Adobe\FC0DB5E6-4B45-4A99-AB08-0F00E4FCC8DE\DAC90326-BD6A-4760-BB5A-1EC19EDE1757\5AA70B6A-8170-4838-AE55-8418EAB418EA" /sAll /re /msi PRODUCT_SOURCE=ACDC OWNERSHIP_STATE=1 UPDATE_MODE=3 EULA_ACCEPT=YES
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\md9fmn2uj52E8Ut8f5xmiH0j4abpph3A.ps1

    Filesize

    23KB

    MD5

    d2e91c11db4839b18d3e90afc151709d

    SHA1

    53fdca35ab2eb30ca7ac9f6a2a4fa14523055ca6

    SHA256

    05c4f31e351d6e97164ec3a249d0c11f32323bcc1c77172c800ae2ac5fb3d8d4

    SHA512

    888122d0bb2b04edc854860a10729ba6724dcaa9c1867a899850b9809435a13147b95003d717252ba0daae888935f76467d585bec563364ab21698cdc225b008

  • C:\ProgramData\readerdc64_fr_xa_mdr_install.exe

    Filesize

    1.3MB

    MD5

    4dce9a0afd4a43f7a21896f50aa2b442

    SHA1

    f915dad6ebd4276518f7d962619a3c4612b76be0

    SHA256

    e939a53fe11b0d32d9ee617f92d48fc4b409516d5c5ecfe4599a6c64d7fb1241

    SHA512

    daf5a5e4b0601f8f0b29f8292b659be41a79d7045fe0b9ffa8b71df966aac01ef5d29bcec2be4aee233926976f8708f6bb86f4639e4ee08368ac9909bfac7290

  • C:\ProgramData\readerdc64_fr_xa_mdr_install.exe

    Filesize

    1.3MB

    MD5

    4dce9a0afd4a43f7a21896f50aa2b442

    SHA1

    f915dad6ebd4276518f7d962619a3c4612b76be0

    SHA256

    e939a53fe11b0d32d9ee617f92d48fc4b409516d5c5ecfe4599a6c64d7fb1241

    SHA512

    daf5a5e4b0601f8f0b29f8292b659be41a79d7045fe0b9ffa8b71df966aac01ef5d29bcec2be4aee233926976f8708f6bb86f4639e4ee08368ac9909bfac7290

  • C:\Users\Admin\AppData\Local\Adobe\FC0DB5E6-4B45-4A99-AB08-0F00E4FCC8DE\DAC90326-BD6A-4760-BB5A-1EC19EDE1757\5AA70B6A-8170-4838-AE55-8418EAB418EA

    Filesize

    27.9MB

    MD5

    f16b0c424de63e70fc3ddb195aa9ab0c

    SHA1

    9bfb42e32ebc6948c2ee47fa88b41b71ebd5f60c

    SHA256

    c839a7ff5977bb5d8fc364f1a22a819c845d3b00dbbcca866f265f8d103b7a89

    SHA512

    296b263989200b0b14f2141bbcf54dbfaed7e8a760b681fc8e49da8418a1098ecfa8d825059e6ad4b51c94f0d3888aceabce16aff388abd6448d06e71a564920

  • C:\Users\Admin\AppData\Local\Adobe\FC0DB5E6-4B45-4A99-AB08-0F00E4FCC8DE\DAC90326-BD6A-4760-BB5A-1EC19EDE1757\5AA70B6A-8170-4838-AE55-8418EAB418EA

    Filesize

    27.4MB

    MD5

    0452e3292faacdf621e36cd52d34e71d

    SHA1

    2febd519e5ae98ebbbc7e405636c1b776685b7b9

    SHA256

    ae40df0c2ff398b0fc6ca0f2aff939cd2f5445de3c9bd0b4a9571b9431b3080d

    SHA512

    006cf266c0727c1823cb2f46a3653110b3031c982db7d72c9143c76fe7e098e400fa934e3c6feb90fc72307d9ae56babec7a9f7fba1801c9f44aca20e6202cf8

  • C:\Users\Admin\AppData\Local\Adobe\FC0DB5E6-4B45-4A99-AB08-0F00E4FCC8DE\progressbar_blue_active_100.png

    Filesize

    14KB

    MD5

    bb94a177f10bf764d11f94d24a5db5aa

    SHA1

    6864b58952b19248f4c5ea5c8764c52e207268a7

    SHA256

    caafea31074ba909ec57c9dcdd1b1c0256e5626939cc768b8a041fe42762e230

    SHA512

    d2875eb5ad9ff76ff233ada04fa77aecdbb0c9a80bcd85b0c50087786b47e97feec189d18164e15784cd96850849ee4e1920d7d98157ca7ad317ba03e8c66111

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u5trkzgh.k5u.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2768-217-0x00000000004C0000-0x00000000008A2000-memory.dmp

    Filesize

    3.9MB

  • memory/2768-150-0x00000000004C0000-0x00000000008A2000-memory.dmp

    Filesize

    3.9MB

  • memory/2768-234-0x00000000004C0000-0x00000000008A2000-memory.dmp

    Filesize

    3.9MB

  • memory/2768-224-0x00000000004C0000-0x00000000008A2000-memory.dmp

    Filesize

    3.9MB

  • memory/2768-220-0x00000000004C0000-0x00000000008A2000-memory.dmp

    Filesize

    3.9MB

  • memory/3164-146-0x000001A920E10000-0x000001A920E20000-memory.dmp

    Filesize

    64KB

  • memory/3164-201-0x000001A920E10000-0x000001A920E20000-memory.dmp

    Filesize

    64KB

  • memory/3164-200-0x000001A920E10000-0x000001A920E20000-memory.dmp

    Filesize

    64KB

  • memory/3164-199-0x000001A920E10000-0x000001A920E20000-memory.dmp

    Filesize

    64KB

  • memory/3164-145-0x000001A920E10000-0x000001A920E20000-memory.dmp

    Filesize

    64KB

  • memory/3164-139-0x000001A9087B0000-0x000001A9087D2000-memory.dmp

    Filesize

    136KB