Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2023 01:29
Static task
static1
Behavioral task
behavioral1
Sample
fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe
Resource
win10v2004-20230703-en
General
-
Target
fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe
-
Size
2.5MB
-
MD5
6ef1e4eb4447a37e49946e86021314e9
-
SHA1
29426df9e7447aa088c21c38f44a9ecfb7b266d9
-
SHA256
fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81
-
SHA512
8b07edc61d257157a2590ccd7e395ff82b94ade2f1f15f5d634f76d73da2a6a6be7e7d083d958a5d021c7925eb2e3583b70e576c4d5f339aa1d8efc12dbac477
-
SSDEEP
24576:ouSNRJncu+meZg+yjGFl4z/sQ65aPuGibvDRv3X/RT50oI3ThQhK+Mh3j3T6u7oQ:oN1hjGgVjUeQjxP/RvxhK+OjG71ol+Mt
Malware Config
Extracted
raccoon
da1a2bf97bd22db993dd01b30d040258
http://77.246.102.57:80/
Signatures
-
Raccoon Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/1288-192-0x0000000000400000-0x000000000040F000-memory.dmp family_raccoon behavioral2/memory/1288-195-0x0000000000400000-0x000000000040F000-memory.dmp family_raccoon behavioral2/memory/1288-197-0x0000000000400000-0x000000000040F000-memory.dmp family_raccoon -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4332 set thread context of 1288 4332 fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe 88 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4332 fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4332 wrote to memory of 1288 4332 fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe 88 PID 4332 wrote to memory of 1288 4332 fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe 88 PID 4332 wrote to memory of 1288 4332 fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe 88 PID 4332 wrote to memory of 1288 4332 fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe 88 PID 4332 wrote to memory of 1288 4332 fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe 88 PID 4332 wrote to memory of 1288 4332 fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe 88 PID 4332 wrote to memory of 1288 4332 fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe 88 PID 4332 wrote to memory of 1288 4332 fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe"C:\Users\Admin\AppData\Local\Temp\fb6dcfde4437027abef2cf99a67351a16f28615457339ac160d55cf8ea57bc81.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:1288
-