Analysis

  • max time kernel
    33s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2023 08:29

General

  • Target

    lwg67u9jwvf.exe

  • Size

    800KB

  • MD5

    972abf3179291dfac99397b5ae996365

  • SHA1

    8272904cb904a2c2103106023c039ee8515721e0

  • SHA256

    03e96c022c76316f6b1db47895edb89666072c1b7104b863a9d229ea74b2ef0a

  • SHA512

    c4d778f594de65974e53069a79660d7dc1073d2bceea76bcdf1b9037a5e9d6c5cf013b8b45723a255d9a288fb5edb17d110a8b5fef7818b44b1126135c409c74

  • SSDEEP

    12288:I8v8SqEnVG0PmTh+kAUsdKI7iuNpH7K/:cfh+kfG7Dq

Malware Config

Extracted

Family

raccoon

Botnet

ef0d247d8b1fe318a7366ceff90b173d

C2

http://79.137.207.76:80/

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lwg67u9jwvf.exe
    "C:\Users\Admin\AppData\Local\Temp\lwg67u9jwvf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:1540
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 92
        2⤵
        • Program crash
        PID:1260

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1540-54-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1540-55-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1540-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/1540-61-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1540-62-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1556-63-0x0000000000C60000-0x0000000000D57000-memory.dmp

      Filesize

      988KB