Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-08-2023 11:56

General

  • Target

    9c948194834768daeef3f6d8c86d456e643d2e026adc588ff7261640b4905fbe.exe

  • Size

    66.0MB

  • MD5

    25e6268a78891921d2046a0fbfb7d0ba

  • SHA1

    45c4edbbaa404bd6b00e6493a98e8e505ae6c33d

  • SHA256

    9c948194834768daeef3f6d8c86d456e643d2e026adc588ff7261640b4905fbe

  • SHA512

    d5e81098b9419b12ebd8b22c30604aa393ce4235c2b1575036dff5e229411fa866f8eb416f53e01d767f5ffd72ada5ae850138a5633f85cdbce8412d636a2171

  • SSDEEP

    24576:s+tsx1pzI5sVbdqjTDo8VyRc/uOgv0mRUorn+FzQXXXXXXXXXXXXXXXXXXXXXXXX:s+mxvwsVIzecGOgcmRUIn+Fz

Malware Config

Extracted

Family

raccoon

Botnet

98a7af8efda2bdaea273f15846e6a0f5

C2

http://94.142.138.6:80/

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c948194834768daeef3f6d8c86d456e643d2e026adc588ff7261640b4905fbe.exe
    "C:\Users\Admin\AppData\Local\Temp\9c948194834768daeef3f6d8c86d456e643d2e026adc588ff7261640b4905fbe.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\Windows\SysWOW64\cmd.exe
      cmd /k cmd < Petite & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4780
      • C:\Windows\SysWOW64\cmd.exe
        cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4944
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell get-process avastui
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1192
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell get-process avgui
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2756
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell get-process nswscsvc
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2948
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V /R "^distributor$" Quilt
          4⤵
            PID:4740
          • C:\Users\Admin\AppData\Local\Temp\30078\30288\Bidder.pif
            30288\\Bidder.pif 30288\\N
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4844
            • C:\Users\Admin\AppData\Local\Temp\30078\30288\Bidder.pif
              C:\Users\Admin\AppData\Local\Temp\30078\30288\Bidder.pif
              5⤵
              • Executes dropped EXE
              PID:4276
            • C:\Users\Admin\AppData\Local\Temp\30078\30288\Bidder.pif
              C:\Users\Admin\AppData\Local\Temp\30078\30288\Bidder.pif
              5⤵
              • Executes dropped EXE
              PID:2152
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 5 localhost
            4⤵
            • Runs ping.exe
            PID:2296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      1KB

      MD5

      def65711d78669d7f8e69313be4acf2e

      SHA1

      6522ebf1de09eeb981e270bd95114bc69a49cda6

      SHA256

      aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

      SHA512

      05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      b56b1a7734175f13ded3c9359257c0aa

      SHA1

      eba40e522b02180e39570b2ade3246ce11eb221d

      SHA256

      8e63fe1a4cadc7f57e3d537f32ab2d87a053776082061687bf8cf4008b8d8336

      SHA512

      bcf57f515d391f89e80d2929c13d2f5c7f0beb5e2110b55ae87a04fb0617e858c303401a30f37dce94cf800b7ca484f02dd657c319aa6bb373ade75332c811e1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      5fae0f96334fef6626376158a3d17c35

      SHA1

      d25d5f7a2a89bcbb0770b65cb82a56c195bc8798

      SHA256

      346b7d0b08b066f60b321f29ac9a0ab04b9aae2a19c43f2ba24a8ba895217882

      SHA512

      b371f5043c2f50ca6e3934c8eddc170255891c877c745b4a572e905a6621384e512d995a688d097b658d766716f7f9529bf817f4ae005ab97a0f656ac81c9b49

    • C:\Users\Admin\AppData\Local\Temp\30078\30288\Bidder.pif

      Filesize

      925KB

      MD5

      0162a97ed477353bc35776a7addffd5c

      SHA1

      10db8fe20bbce0f10517c510ec73532cf6feb227

      SHA256

      15600ccdef5a64b40d206d89234a51be1e11bd878dcefc5986590bcf40d9d571

      SHA512

      9638cab1aabe78c22a3d3528a391544f697d792640d831516b63fa52c393ee96bb588223e70163d059208cc5a14481c5ff7ef6ba9ac572322798a823d67f01f5

    • C:\Users\Admin\AppData\Local\Temp\30078\30288\Bidder.pif

      Filesize

      925KB

      MD5

      0162a97ed477353bc35776a7addffd5c

      SHA1

      10db8fe20bbce0f10517c510ec73532cf6feb227

      SHA256

      15600ccdef5a64b40d206d89234a51be1e11bd878dcefc5986590bcf40d9d571

      SHA512

      9638cab1aabe78c22a3d3528a391544f697d792640d831516b63fa52c393ee96bb588223e70163d059208cc5a14481c5ff7ef6ba9ac572322798a823d67f01f5

    • C:\Users\Admin\AppData\Local\Temp\30078\30288\Bidder.pif

      Filesize

      925KB

      MD5

      0162a97ed477353bc35776a7addffd5c

      SHA1

      10db8fe20bbce0f10517c510ec73532cf6feb227

      SHA256

      15600ccdef5a64b40d206d89234a51be1e11bd878dcefc5986590bcf40d9d571

      SHA512

      9638cab1aabe78c22a3d3528a391544f697d792640d831516b63fa52c393ee96bb588223e70163d059208cc5a14481c5ff7ef6ba9ac572322798a823d67f01f5

    • C:\Users\Admin\AppData\Local\Temp\30078\Contents

      Filesize

      110KB

      MD5

      3c5589643b69ee0457a3490a75db7eea

      SHA1

      51cd18184d0df870d33e9da22699179d0fe5c016

      SHA256

      b5abef5ec9fe79ab1310402b682bb5d1cfb50e18c787f4f2f4bc2369531cae88

      SHA512

      50139d1a9439789ca98921803be5b52cf58288229f91b8560ba5ad0d6dc0527ed7955ab011561721892404e12995094002ec9f9066ecd5c07e73a25a7e04026b

    • C:\Users\Admin\AppData\Local\Temp\30078\Expected

      Filesize

      69KB

      MD5

      5154e7df9e7a0dec08f9cbe3fef209ab

      SHA1

      ae7629495e875f97e3a3ca5fc044958472fbe893

      SHA256

      0b1cab05ae3617697dc77e1414869ce945bb98b18d0c84d5fdf62343252bd9bc

      SHA512

      be582f03aeaeddebb24f3a8acf6a2611c198f5204e9ae9a84c4e5b662cc16279c9efeff292422e2243e0997fa2bc4d933364e7e312b62c0c186b0d41003e09f8

    • C:\Users\Admin\AppData\Local\Temp\30078\Homeland

      Filesize

      113KB

      MD5

      d9cf3769c0b4cf390a52dd057ab2de93

      SHA1

      28827192faac204b39f8c0182060d91fdd67ef12

      SHA256

      d6b0831d2c5ad112ecd8a2011e23359f423f3e0cd0c5d8ab6f325feae38eb402

      SHA512

      3b0bcadb4aeb5de53a0ec0cf4c1d673dd53aeb3d6ebe8874875b54f09cde4eabe746766467be5a1bdc8440fd15ccabd87f398a957dbbf9076aa2a1b97a200c80

    • C:\Users\Admin\AppData\Local\Temp\30078\Mail

      Filesize

      43KB

      MD5

      64ff9e8daf4b3a4a1a30ffede6a0aa2d

      SHA1

      bd64ed4203d3583b165c38081b5a33a3ec6a99f9

      SHA256

      9b16db1ec8bcf1abfa46ff0b152da7099d69345049327044e2a852836e4b27d9

      SHA512

      974f41b60f2c422a439e5e080e55ac9544d287d3991285f3ec1a3d5407ed9a90d77ed239ba62dabbeb24b864833bd5ae0c882fc0bf6cd5527c549329429f2b05

    • C:\Users\Admin\AppData\Local\Temp\30078\Petite

      Filesize

      15KB

      MD5

      c3f50f45bb9d33fdc832b64e2adff19d

      SHA1

      c2dab52960fa395b509659d537b43fc00c9b26f5

      SHA256

      ccd716e1d6dafb546465b64261d390affe8e80dc61af9a04aaeabc708c137b5b

      SHA512

      15414b9fab4749e94cb53b9421f7173ce5a1b6c4a2dad8c8a34b2af521a608e269c3731551476df046c8180e98ba564b5f0fcdb90220971034ce84a3a99f0bf7

    • C:\Users\Admin\AppData\Local\Temp\30078\Pit

      Filesize

      93KB

      MD5

      3d17ca2d26ecf82d93d0f04df317e159

      SHA1

      2e8b09dd6755353522ab20a6f7a4232056f2a3e1

      SHA256

      7f9702973753bae78d2f94165ce775eeadf27019bc15a3ffd685b526d6270373

      SHA512

      d0547ca52d46722dd2e4a9e851c32607dd64d405f7e9e484cfaf7ef572066a7db09ba9e90a0f130e32eb2a46413ffdea396e7da62dcd1057575ae15344a5b242

    • C:\Users\Admin\AppData\Local\Temp\30078\Quilt

      Filesize

      925KB

      MD5

      474a5196ac50a289b1b8be3e102b2e65

      SHA1

      f6ba14f9d6adf8eeb70b4278759b51c6b722da1f

      SHA256

      f4adba4d027f6ccfa1fd9496141ec329d8d5e07e405e2eb69b94264446481ffe

      SHA512

      9da931ae6a3fcc392ff86ec383164886beee9f9d4cde44baf5ce0ccdc5f255014738af7dc74e25a700ceca9ab89638d41a1207d98ce89cf3f904db968df9e81c

    • C:\Users\Admin\AppData\Local\Temp\30078\Reduction

      Filesize

      17KB

      MD5

      a4bcf9e664de8c00bda025b397aac6af

      SHA1

      dfaae2037727b497622b558c0c0ab0139b11165c

      SHA256

      8eff7c73644e1c0d7609c8d1f3784244131e0ee9fb8176b41f9441b70ad514dc

      SHA512

      2417297bad715065784786e0a150f716e6a407a012f3670f1a775bb7b738aed4122c0f9d259ebeef82680221d0768dd3a0b9e25a977b1fb045bcf109ba708448

    • C:\Users\Admin\AppData\Local\Temp\30078\Techno

      Filesize

      99KB

      MD5

      eb60682bb4855823412acc91e91793d8

      SHA1

      17c9fbd14a3d2ed272fe01f8a21784d29b98df03

      SHA256

      24964592bdb8981aa6a90139c15eae8be5bc73f6d12966e43fe770809d522a08

      SHA512

      9e7f5115d717187296f8ba05abb7c0c7afcc35d7f4d9d2b114404b4b8d19f25f4b0af02f0358f5a3d0fdb86f337ac62d4330d3ca9268205a2b27d94844241133

    • C:\Users\Admin\AppData\Local\Temp\30078\Tribes

      Filesize

      57KB

      MD5

      9b59768332d527128b0ac9785a88e6ea

      SHA1

      8ed38622c908571ecb0e6eba3e795f5e0e024008

      SHA256

      78bf6dcc3fdef08a96d4f043a1da54516d5ca9e094fdbe244bfea7c26148ad08

      SHA512

      b84c7d4f662618c77dafe39ca4b72797b052b805b4752d3eb2d523a0a391ba78b8fe9372abaa87a495b3d5b1e2862e590773bbd0a8e03354b3ffa9275f180cb1

    • C:\Users\Admin\AppData\Local\Temp\30078\Troops

      Filesize

      130KB

      MD5

      e7d50301e0ee6c1d06dee7daadc0ac77

      SHA1

      cad78cfd4bc4e92b4d8f6378850cfc94d51f1d51

      SHA256

      caf38e04a6a154b9d50ff18d3eb38c3c4b47fff2f34d1f3a08e2a4288bd1c611

      SHA512

      e13edec250b7f3f6c8157f3441e18ae162203ac1eb0ebd578ec8c9174b633cdbea3cab92b47c698daa92e2ae840301788b40ace4ac25af1f324871bbaafa67dc

    • C:\Users\Admin\AppData\Local\Temp\30078\Vision

      Filesize

      194KB

      MD5

      38dc4dd2e9a74aefde98de84df033944

      SHA1

      942132e95742613de6e7461e8d964a2a4ae467af

      SHA256

      3d64d4b577fd0bec151d70d24ad77dc30466892bce52b82283c4ce9b744f7130

      SHA512

      789d76936569de4be453cd23a544847a0146fd8f866b894a4d3c1ab496143fbed80af6a10318bc1ca05dfbc9c91340f64e983b3608fccc8b7914c2bd477e7d44

    • C:\Users\Admin\AppData\Local\Temp\30078\Width

      Filesize

      453KB

      MD5

      df4c50ad93fbbd34fd6b601e080ef212

      SHA1

      38fa5848255e2a68ee3b611f9cf2c7e484170450

      SHA256

      28a4fc1758bce69ba14002852da4eb0068fcdda507bf26f8f681e3b6263aed29

      SHA512

      d00636321b32ac019a1841f807ecfac025d70db3fb5ab4fda11d9459058aea5728d181de88b2fe49312ea10ab6e30d36e6b87b31392b71b1c50be76ddf845d04

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j5n3gygz.qaf.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1192-165-0x00000000077B0000-0x0000000007846000-memory.dmp

      Filesize

      600KB

    • memory/1192-164-0x00000000067E0000-0x00000000067FE000-memory.dmp

      Filesize

      120KB

    • memory/1192-148-0x0000000002EB0000-0x0000000002EE6000-memory.dmp

      Filesize

      216KB

    • memory/1192-150-0x00000000053A0000-0x00000000053B0000-memory.dmp

      Filesize

      64KB

    • memory/1192-151-0x00000000059E0000-0x0000000006008000-memory.dmp

      Filesize

      6.2MB

    • memory/1192-152-0x0000000005820000-0x0000000005842000-memory.dmp

      Filesize

      136KB

    • memory/1192-153-0x0000000006110000-0x0000000006176000-memory.dmp

      Filesize

      408KB

    • memory/1192-156-0x0000000006180000-0x00000000061E6000-memory.dmp

      Filesize

      408KB

    • memory/1192-149-0x00000000053A0000-0x00000000053B0000-memory.dmp

      Filesize

      64KB

    • memory/1192-147-0x0000000075020000-0x00000000757D0000-memory.dmp

      Filesize

      7.7MB

    • memory/1192-166-0x0000000006CB0000-0x0000000006CCA000-memory.dmp

      Filesize

      104KB

    • memory/1192-171-0x0000000075020000-0x00000000757D0000-memory.dmp

      Filesize

      7.7MB

    • memory/1192-168-0x0000000007E00000-0x00000000083A4000-memory.dmp

      Filesize

      5.6MB

    • memory/1192-167-0x0000000006D00000-0x0000000006D22000-memory.dmp

      Filesize

      136KB

    • memory/2152-230-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2152-227-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2756-173-0x0000000075020000-0x00000000757D0000-memory.dmp

      Filesize

      7.7MB

    • memory/2756-176-0x0000000002A50000-0x0000000002A60000-memory.dmp

      Filesize

      64KB

    • memory/2756-188-0x0000000075020000-0x00000000757D0000-memory.dmp

      Filesize

      7.7MB

    • memory/2756-175-0x0000000002A50000-0x0000000002A60000-memory.dmp

      Filesize

      64KB

    • memory/2948-204-0x0000000075020000-0x00000000757D0000-memory.dmp

      Filesize

      7.7MB

    • memory/2948-191-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/2948-190-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/2948-189-0x0000000075020000-0x00000000757D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4292-202-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/4292-222-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/4292-133-0x0000000002330000-0x0000000002331000-memory.dmp

      Filesize

      4KB

    • memory/4292-174-0x0000000002330000-0x0000000002331000-memory.dmp

      Filesize

      4KB

    • memory/4844-223-0x0000000003F30000-0x0000000003F31000-memory.dmp

      Filesize

      4KB