Analysis
-
max time kernel
55s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2023 12:11
Static task
static1
Behavioral task
behavioral1
Sample
114319af1b37e7a22a3fd57d722e7f7a.bin.exe
Resource
win7-20230621-en
General
-
Target
114319af1b37e7a22a3fd57d722e7f7a.bin.exe
-
Size
508KB
-
MD5
114319af1b37e7a22a3fd57d722e7f7a
-
SHA1
c39e805df8a43f140ae3af3ae72d6b62c9106bc9
-
SHA256
a040c35ef32cbe289d5bc2b8014adcb961ab3aed1e2873d1f2e335933e97927b
-
SHA512
b655367e07eb81ba21b215ca6140a038c0850a05be97d7a1e0381865a099e4250ca4045bfaf9852bfb2854ffa96107383568c38b901e1e63f3f14f439f1e7f37
-
SSDEEP
12288:ntH5NLaAdDhAAEIFcWX+t4o763GgB5KEA8GsEiybiL:ntH5sAdXEIFcUo763XxbEiyM
Malware Config
Signatures
-
Raccoon Stealer payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.1.1.1.exe family_raccoon C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.1.1.1.exe family_raccoon C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.1.1.1.exe family_raccoon -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
114319af1b37e7a22a3fd57d722e7f7a.bin.exe2.1.1.1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Control Panel\International\Geo\Nation 114319af1b37e7a22a3fd57d722e7f7a.bin.exe Key value queried \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Control Panel\International\Geo\Nation 2.1.1.1.exe -
Executes dropped EXE 2 IoCs
Processes:
2.1.1.1.exe2.1.1.1.exepid process 1524 2.1.1.1.exe 912 2.1.1.1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
114319af1b37e7a22a3fd57d722e7f7a.bin.execmd.exe2.1.1.1.exedescription pid process target process PID 2612 wrote to memory of 464 2612 114319af1b37e7a22a3fd57d722e7f7a.bin.exe cmd.exe PID 2612 wrote to memory of 464 2612 114319af1b37e7a22a3fd57d722e7f7a.bin.exe cmd.exe PID 2612 wrote to memory of 464 2612 114319af1b37e7a22a3fd57d722e7f7a.bin.exe cmd.exe PID 464 wrote to memory of 1524 464 cmd.exe 2.1.1.1.exe PID 464 wrote to memory of 1524 464 cmd.exe 2.1.1.1.exe PID 464 wrote to memory of 1524 464 cmd.exe 2.1.1.1.exe PID 1524 wrote to memory of 912 1524 2.1.1.1.exe 2.1.1.1.exe PID 1524 wrote to memory of 912 1524 2.1.1.1.exe 2.1.1.1.exe PID 1524 wrote to memory of 912 1524 2.1.1.1.exe 2.1.1.1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\114319af1b37e7a22a3fd57d722e7f7a.bin.exe"C:\Users\Admin\AppData\Local\Temp\114319af1b37e7a22a3fd57d722e7f7a.bin.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\start.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\2.1.1.1.exe2.1.1.1.exe -pAlex.199455alex.199455 -dC:\3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.1.1.1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.1.1.1.exe"4⤵
- Executes dropped EXE
PID:912
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD59f7c947242b7ce3f185b04713d86d127
SHA1ab270f914dec3eece3131dfbd5d22cad87f42ab9
SHA256cd61404e2f0c45db3598d29e0d194b57905cb6dd9c55e5775fc10b1a46bfe993
SHA512573ffbdbedbe18a24fad9a78d4704226b46928eca8edb945a9824293a66631752fcc449717ed46d6152d923537178bb74731f163f433d7152b721b9151f45a22
-
Filesize
338KB
MD59f7c947242b7ce3f185b04713d86d127
SHA1ab270f914dec3eece3131dfbd5d22cad87f42ab9
SHA256cd61404e2f0c45db3598d29e0d194b57905cb6dd9c55e5775fc10b1a46bfe993
SHA512573ffbdbedbe18a24fad9a78d4704226b46928eca8edb945a9824293a66631752fcc449717ed46d6152d923537178bb74731f163f433d7152b721b9151f45a22
-
Filesize
50KB
MD53357867b4c095d1cf04d3d648eed5b4c
SHA14463030c518306e8eb1f811e3fefde96fbf57fe2
SHA25675ac5377b0ba78771b4f352edb5ea243b2fb478f3cbe9e94ea559150125af13d
SHA5123592c20a31541385238faebee0d7618ebd2a1cf58eb625585c2033586be0d2db5b671117a00989d633c44acdcc52c0a78a27fdd8e9a50da27792dbc88cc70f67
-
Filesize
50KB
MD53357867b4c095d1cf04d3d648eed5b4c
SHA14463030c518306e8eb1f811e3fefde96fbf57fe2
SHA25675ac5377b0ba78771b4f352edb5ea243b2fb478f3cbe9e94ea559150125af13d
SHA5123592c20a31541385238faebee0d7618ebd2a1cf58eb625585c2033586be0d2db5b671117a00989d633c44acdcc52c0a78a27fdd8e9a50da27792dbc88cc70f67
-
Filesize
50KB
MD53357867b4c095d1cf04d3d648eed5b4c
SHA14463030c518306e8eb1f811e3fefde96fbf57fe2
SHA25675ac5377b0ba78771b4f352edb5ea243b2fb478f3cbe9e94ea559150125af13d
SHA5123592c20a31541385238faebee0d7618ebd2a1cf58eb625585c2033586be0d2db5b671117a00989d633c44acdcc52c0a78a27fdd8e9a50da27792dbc88cc70f67
-
Filesize
42B
MD5c18e7402bfc924e0e3ef7c92b4d6db50
SHA1e185027b2988cec5a919f72f79e42c17c7201297
SHA2565fd3394e00feef9fc0c970fd02c2f91057e92ad8970559704ae3224968192c9e
SHA51273ecaa2b760cbd11f24fd58f8f5c3dea947cfc7e58c9ef098b304a141062456982f93104b6fa16df212c8464a20daf029503f7752cd8e77e52b2aca027f05479