Analysis
-
max time kernel
99s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2023 07:21
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230621-en
General
-
Target
setup.exe
-
Size
6.7MB
-
MD5
7fdff809af7d3b25c76709165a78a89e
-
SHA1
6a62910a88111aad6a22924a8e1d1a35626f6bee
-
SHA256
e1689f695b580c88f6b58274cfed905541749bd86f9f3cd95b70ae22387313ca
-
SHA512
925fbf207a628989230ccbdb16e41eb8a54c9df801e05f4a3ee71d8f66557e97fdef7453b89f50f73d8ef812edb7ff43178a367a4f1f67b901ef1972cb35f950
-
SSDEEP
98304:yQG23fmewHtW7ZgPsy8WtNyDqmNiRMkJlSqxegWtIoZv082OQvG5N8pbso2x+x:jaQy86+iRM8EIegG/ZvhWrgj6
Malware Config
Extracted
raccoon
417f00e313b534b6267434933616178b
http://193.149.185.171
http://193.149.180.60
http://193.149.187.34
Signatures
-
Raccoon Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2736-144-0x0000000000400000-0x0000000000412000-memory.dmp family_raccoon behavioral2/memory/2736-147-0x0000000000400000-0x0000000000412000-memory.dmp family_raccoon behavioral2/memory/2736-148-0x0000000000400000-0x0000000000412000-memory.dmp family_raccoon -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe -
Processes:
resource yara_rule behavioral2/memory/4428-141-0x0000000000EE0000-0x0000000001F10000-memory.dmp themida behavioral2/memory/4428-142-0x0000000000EE0000-0x0000000001F10000-memory.dmp themida behavioral2/memory/4428-150-0x0000000000EE0000-0x0000000001F10000-memory.dmp themida -
Processes:
setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
setup.exepid process 4428 setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
setup.exedescription pid process target process PID 4428 set thread context of 2736 4428 setup.exe jsc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
setup.exepid process 4428 setup.exe 4428 setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
setup.exedescription pid process Token: SeDebugPrivilege 4428 setup.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
setup.exedescription pid process target process PID 4428 wrote to memory of 1352 4428 setup.exe jsc.exe PID 4428 wrote to memory of 1352 4428 setup.exe jsc.exe PID 4428 wrote to memory of 1352 4428 setup.exe jsc.exe PID 4428 wrote to memory of 2736 4428 setup.exe jsc.exe PID 4428 wrote to memory of 2736 4428 setup.exe jsc.exe PID 4428 wrote to memory of 2736 4428 setup.exe jsc.exe PID 4428 wrote to memory of 2736 4428 setup.exe jsc.exe PID 4428 wrote to memory of 2736 4428 setup.exe jsc.exe PID 4428 wrote to memory of 2736 4428 setup.exe jsc.exe PID 4428 wrote to memory of 2736 4428 setup.exe jsc.exe PID 4428 wrote to memory of 2736 4428 setup.exe jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵PID:1352
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵PID:2736
-