Analysis
-
max time kernel
143s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-06-2023 09:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe
Resource
win7-20230220-en
windows7-x64
6 signatures
150 seconds
General
-
Target
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe
-
Size
7.2MB
-
MD5
23c28c4c8ee60fa2042aa374739d712a
-
SHA1
17363e779d8956d38ec84b0281823c225433d729
-
SHA256
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a
-
SHA512
76829322577a15454e1e137916803fbba4dd4fe7e259a4acfb6c756885f7bbbe2a53613063c0013e6af4dc2270ce9a50ac1d7238eb06df045d91a0a9b63c60e8
-
SSDEEP
49152:FaSPHIVAnCFFDh3ZY6jhT85sCL1Ge96ShWc7FNbqb4mbm:FaSPoVAYzZhIySY+hrpUb4Gm
Malware Config
Signatures
-
Raccoon Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/932-996-0x0000000000400000-0x000000000040F000-memory.dmp family_raccoon -
Suspicious use of SetThreadContext 1 IoCs
Processes:
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exedescription pid process target process PID 1256 set thread context of 932 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exepid process 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exedescription pid process Token: SeDebugPrivilege 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exedescription pid process target process PID 1256 wrote to memory of 932 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe PID 1256 wrote to memory of 932 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe PID 1256 wrote to memory of 932 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe PID 1256 wrote to memory of 932 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe PID 1256 wrote to memory of 932 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe PID 1256 wrote to memory of 932 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe PID 1256 wrote to memory of 932 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe PID 1256 wrote to memory of 932 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe PID 1256 wrote to memory of 932 1256 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe"C:\Users\Admin\AppData\Local\Temp\36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exeC:\Users\Admin\AppData\Local\Temp\36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe2⤵PID:932
-