Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2023 19:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
file.exe
-
Size
336KB
-
MD5
e94ec358349808b167fe25704bbb1c43
-
SHA1
6c48cab4905b96605d64de1718c6fe07b17392c0
-
SHA256
f63154fccd7521dbe450f56aefff2a73d199489f8b68be7bd03befc5a98ddc36
-
SHA512
a2a890b872704b49b0692b077439ee2a65e73641553729f614c5b230df0591d59984f3d564ffde9d11223133bedaf4a70e2db7075b4e5ca9de9d8bd5f7798ad7
-
SSDEEP
6144:b46HZImXdPNhShn6XpLaJba4XcwfkBYuOVx6rfWd+V9nJ2/FnRy5pg:b46HZlXXhOnY9a9PswfkBYuo0DLnJ2dP
Score
10/10
Malware Config
Extracted
Family
raccoon
Botnet
a8557a01243914ccfb9f74ba3a926fa2
C2
http://5.42.64.17:80/
http://5.42.65.62:80/
xor.plain
Signatures
-
Raccoon Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1636-142-0x0000000000400000-0x000000000041F000-memory.dmp family_raccoon behavioral2/memory/1636-140-0x0000000000400000-0x000000000041F000-memory.dmp family_raccoon behavioral2/memory/1636-144-0x0000000000400000-0x000000000041F000-memory.dmp family_raccoon -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 824 set thread context of 1636 824 file.exe file.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
file.exedescription pid process target process PID 824 wrote to memory of 3064 824 file.exe file.exe PID 824 wrote to memory of 3064 824 file.exe file.exe PID 824 wrote to memory of 3064 824 file.exe file.exe PID 824 wrote to memory of 1636 824 file.exe file.exe PID 824 wrote to memory of 1636 824 file.exe file.exe PID 824 wrote to memory of 1636 824 file.exe file.exe PID 824 wrote to memory of 1636 824 file.exe file.exe PID 824 wrote to memory of 1636 824 file.exe file.exe PID 824 wrote to memory of 1636 824 file.exe file.exe PID 824 wrote to memory of 1636 824 file.exe file.exe PID 824 wrote to memory of 1636 824 file.exe file.exe PID 824 wrote to memory of 1636 824 file.exe file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:3064
-