Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14-08-2023 16:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
3.5MB
-
MD5
4695f98bf6e8c0908c0b6af77ec31a6c
-
SHA1
41b05253a583238d6c583a97eb6d45e92607f53d
-
SHA256
36dc266ad1ea8df01393368710ee6c6fd21629e833252cf0f3f63dffd908c805
-
SHA512
b85d91a68c514e2e27d0a1b72aa7d12abed855953944eb2ab7a723a9770972b94434416a2415fc46a3aee516642121329b22eb61f80fc760d011da0ce4acfb30
-
SSDEEP
24576:Pam/O3RT2048qUkeSLdnC/sGB9D/YBl7B3Yom6pd+e6idu6sN6FCBfcW877++aIS:PaZ3Rb4UScABl7B3YH6pd+e6i
Score
10/10
Malware Config
Extracted
Family
raccoon
Botnet
071a7b18a42c1cd94de2fc5bb0bbcaf2
C2
http://193.142.147.59:80
xor.plain
Signatures
-
Raccoon Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2980-1395-0x0000000000400000-0x000000000040F000-memory.dmp family_raccoon behavioral1/memory/2980-1396-0x0000000000400000-0x000000000040F000-memory.dmp family_raccoon -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 2084 set thread context of 2980 2084 tmp.exe tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tmp.exedescription pid process Token: SeDebugPrivilege 2084 tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
tmp.exedescription pid process target process PID 2084 wrote to memory of 2980 2084 tmp.exe tmp.exe PID 2084 wrote to memory of 2980 2084 tmp.exe tmp.exe PID 2084 wrote to memory of 2980 2084 tmp.exe tmp.exe PID 2084 wrote to memory of 2980 2084 tmp.exe tmp.exe PID 2084 wrote to memory of 2980 2084 tmp.exe tmp.exe PID 2084 wrote to memory of 2980 2084 tmp.exe tmp.exe PID 2084 wrote to memory of 2980 2084 tmp.exe tmp.exe PID 2084 wrote to memory of 2980 2084 tmp.exe tmp.exe PID 2084 wrote to memory of 2980 2084 tmp.exe tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:2980
-