Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
01-07-2023 07:21
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230621-en
General
-
Target
setup.exe
-
Size
6.7MB
-
MD5
7fdff809af7d3b25c76709165a78a89e
-
SHA1
6a62910a88111aad6a22924a8e1d1a35626f6bee
-
SHA256
e1689f695b580c88f6b58274cfed905541749bd86f9f3cd95b70ae22387313ca
-
SHA512
925fbf207a628989230ccbdb16e41eb8a54c9df801e05f4a3ee71d8f66557e97fdef7453b89f50f73d8ef812edb7ff43178a367a4f1f67b901ef1972cb35f950
-
SSDEEP
98304:yQG23fmewHtW7ZgPsy8WtNyDqmNiRMkJlSqxegWtIoZv082OQvG5N8pbso2x+x:jaQy86+iRM8EIegG/ZvhWrgj6
Malware Config
Extracted
raccoon
417f00e313b534b6267434933616178b
http://193.149.185.171
http://193.149.180.60
http://193.149.187.34
Signatures
-
Raccoon Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1764-66-0x0000000000400000-0x0000000000412000-memory.dmp family_raccoon behavioral1/memory/1764-68-0x0000000000400000-0x0000000000412000-memory.dmp family_raccoon behavioral1/memory/1764-72-0x0000000000400000-0x0000000000412000-memory.dmp family_raccoon -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe -
Processes:
resource yara_rule behavioral1/memory/1496-59-0x0000000000D30000-0x0000000001D60000-memory.dmp themida behavioral1/memory/1496-60-0x0000000000D30000-0x0000000001D60000-memory.dmp themida behavioral1/memory/1496-71-0x0000000000D30000-0x0000000001D60000-memory.dmp themida -
Processes:
setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
setup.exepid process 1496 setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
setup.exedescription pid process target process PID 1496 set thread context of 1764 1496 setup.exe jsc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
setup.exedescription pid process target process PID 1496 wrote to memory of 1764 1496 setup.exe jsc.exe PID 1496 wrote to memory of 1764 1496 setup.exe jsc.exe PID 1496 wrote to memory of 1764 1496 setup.exe jsc.exe PID 1496 wrote to memory of 1764 1496 setup.exe jsc.exe PID 1496 wrote to memory of 1764 1496 setup.exe jsc.exe PID 1496 wrote to memory of 1764 1496 setup.exe jsc.exe PID 1496 wrote to memory of 1764 1496 setup.exe jsc.exe PID 1496 wrote to memory of 1764 1496 setup.exe jsc.exe PID 1496 wrote to memory of 1764 1496 setup.exe jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵PID:1764
-