Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 05:06
Behavioral task
behavioral1
Sample
a22694ecc330877c14c622a338f099d5.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
a22694ecc330877c14c622a338f099d5.exe
Resource
win10v2004-20230703-en
General
-
Target
a22694ecc330877c14c622a338f099d5.exe
-
Size
3.5MB
-
MD5
a22694ecc330877c14c622a338f099d5
-
SHA1
c41f047be2b696dea3184b7ebffe647079f3954c
-
SHA256
53fe510daa3712b64c24d8f30658e1408929369735c50cc3bbb61e26c55d786e
-
SHA512
b16f22efc084dbae29fa363430362817b7868807309a789ac65b33d68cb460db6455ba1ab5dd1484e87afd4ba3fcb1dda66688d6a7c97c4d911d3fd580b5d8ec
-
SSDEEP
24576:NSpM9XJSnFTGkzgB3uz60e5Lb1HCfLSovTaCqbvF+WKzQqW/pt64Y5v7QHuHOhHc:NgHny3COVb1HCfLpvKqV
Malware Config
Extracted
raccoon
fa72f4c1fbe65cee8651140fd47267ba
http://193.142.147.59:80
Signatures
-
Detect Neshta payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000001f059-69.dat family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Raccoon Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/3092-1407-0x0000000000400000-0x000000000040F000-memory.dmp family_raccoon behavioral2/memory/3092-1427-0x0000000000400000-0x000000000040F000-memory.dmp family_raccoon -
Executes dropped EXE 3 IoCs
pid Process 2876 a22694ecc330877c14c622a338f099d5.exe 1972 a22694ecc330877c14c622a338f099d5.exe 3092 a22694ecc330877c14c622a338f099d5.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" a22694ecc330877c14c622a338f099d5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2876 set thread context of 3092 2876 a22694ecc330877c14c622a338f099d5.exe 87 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe a22694ecc330877c14c622a338f099d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE a22694ecc330877c14c622a338f099d5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com a22694ecc330877c14c622a338f099d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" a22694ecc330877c14c622a338f099d5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2876 a22694ecc330877c14c622a338f099d5.exe 2876 a22694ecc330877c14c622a338f099d5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2876 a22694ecc330877c14c622a338f099d5.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4904 wrote to memory of 2876 4904 a22694ecc330877c14c622a338f099d5.exe 81 PID 4904 wrote to memory of 2876 4904 a22694ecc330877c14c622a338f099d5.exe 81 PID 4904 wrote to memory of 2876 4904 a22694ecc330877c14c622a338f099d5.exe 81 PID 2876 wrote to memory of 1972 2876 a22694ecc330877c14c622a338f099d5.exe 86 PID 2876 wrote to memory of 1972 2876 a22694ecc330877c14c622a338f099d5.exe 86 PID 2876 wrote to memory of 1972 2876 a22694ecc330877c14c622a338f099d5.exe 86 PID 2876 wrote to memory of 3092 2876 a22694ecc330877c14c622a338f099d5.exe 87 PID 2876 wrote to memory of 3092 2876 a22694ecc330877c14c622a338f099d5.exe 87 PID 2876 wrote to memory of 3092 2876 a22694ecc330877c14c622a338f099d5.exe 87 PID 2876 wrote to memory of 3092 2876 a22694ecc330877c14c622a338f099d5.exe 87 PID 2876 wrote to memory of 3092 2876 a22694ecc330877c14c622a338f099d5.exe 87 PID 2876 wrote to memory of 3092 2876 a22694ecc330877c14c622a338f099d5.exe 87 PID 2876 wrote to memory of 3092 2876 a22694ecc330877c14c622a338f099d5.exe 87 PID 2876 wrote to memory of 3092 2876 a22694ecc330877c14c622a338f099d5.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a22694ecc330877c14c622a338f099d5.exe"C:\Users\Admin\AppData\Local\Temp\a22694ecc330877c14c622a338f099d5.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\a22694ecc330877c14c622a338f099d5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\a22694ecc330877c14c622a338f099d5.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\a22694ecc330877c14c622a338f099d5.exeC:\Users\Admin\AppData\Local\Temp\3582-490\a22694ecc330877c14c622a338f099d5.exe3⤵
- Executes dropped EXE
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\a22694ecc330877c14c622a338f099d5.exeC:\Users\Admin\AppData\Local\Temp\3582-490\a22694ecc330877c14c622a338f099d5.exe3⤵
- Executes dropped EXE
PID:3092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD58ffc3bdf4a1903d9e28b99d1643fc9c7
SHA1919ba8594db0ae245a8abd80f9f3698826fc6fe5
SHA2568268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6
SHA5120b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427
-
Filesize
3.5MB
MD57aa8353d95576dfdd42d2382ffe0e626
SHA19798cd96ca573c6f54fc84611cfc4a7802212dea
SHA2569d05e8ef93511f02e7f0d270402b37658817a2d233f9cd12b40b87d4a4af7a77
SHA512f536592a62c5b510f05dc05b866c59557a7246052605551d364c4c1a9d9f8b94f01dbd3cf8526e4a5bded4dd81791923f14f424310d712306b523c3aca8bbc64
-
Filesize
3.5MB
MD57aa8353d95576dfdd42d2382ffe0e626
SHA19798cd96ca573c6f54fc84611cfc4a7802212dea
SHA2569d05e8ef93511f02e7f0d270402b37658817a2d233f9cd12b40b87d4a4af7a77
SHA512f536592a62c5b510f05dc05b866c59557a7246052605551d364c4c1a9d9f8b94f01dbd3cf8526e4a5bded4dd81791923f14f424310d712306b523c3aca8bbc64
-
Filesize
3.5MB
MD57aa8353d95576dfdd42d2382ffe0e626
SHA19798cd96ca573c6f54fc84611cfc4a7802212dea
SHA2569d05e8ef93511f02e7f0d270402b37658817a2d233f9cd12b40b87d4a4af7a77
SHA512f536592a62c5b510f05dc05b866c59557a7246052605551d364c4c1a9d9f8b94f01dbd3cf8526e4a5bded4dd81791923f14f424310d712306b523c3aca8bbc64
-
Filesize
3.5MB
MD57aa8353d95576dfdd42d2382ffe0e626
SHA19798cd96ca573c6f54fc84611cfc4a7802212dea
SHA2569d05e8ef93511f02e7f0d270402b37658817a2d233f9cd12b40b87d4a4af7a77
SHA512f536592a62c5b510f05dc05b866c59557a7246052605551d364c4c1a9d9f8b94f01dbd3cf8526e4a5bded4dd81791923f14f424310d712306b523c3aca8bbc64
-
Filesize
3.5MB
MD57aa8353d95576dfdd42d2382ffe0e626
SHA19798cd96ca573c6f54fc84611cfc4a7802212dea
SHA2569d05e8ef93511f02e7f0d270402b37658817a2d233f9cd12b40b87d4a4af7a77
SHA512f536592a62c5b510f05dc05b866c59557a7246052605551d364c4c1a9d9f8b94f01dbd3cf8526e4a5bded4dd81791923f14f424310d712306b523c3aca8bbc64