Analysis
-
max time kernel
142s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 00:58
Static task
static1
Behavioral task
behavioral1
Sample
159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe
-
Size
238KB
-
MD5
8e16f708713d59a7764c78dc59b9b12a
-
SHA1
ca33ab8943ae25fee116aed6e9b154e0e52035f7
-
SHA256
159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010
-
SHA512
055ffac712cb90d17d85c77b32b6b3a229a046cd5f63af546257b45142731045fddb0fffb9e0dabe77ec8519735fa6f0bba876f701e5f8f8280a0b529d7714c6
-
SSDEEP
3072:bffu0FebfDTUilVw9WXgtjXGNgC9vGKo4Ek6miS5vfXTzj:D3eTUwO9WXobGNgAGn4EzwfXT
Malware Config
Extracted
raccoon
0da2e3700aa6f05465fdfc323d371488
http://94.142.138.19:80
-
user_agent
GeekingToTheMoon
Signatures
-
Raccoon Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/3424-1-0x0000000002260000-0x000000000227A000-memory.dmp family_raccoon behavioral2/memory/3424-2-0x0000000000400000-0x00000000004ED000-memory.dmp family_raccoon behavioral2/memory/3424-3-0x0000000000400000-0x00000000004ED000-memory.dmp family_raccoon behavioral2/memory/3424-5-0x0000000002260000-0x000000000227A000-memory.dmp family_raccoon -
Program crash 1 IoCs
pid pid_target Process procid_target 3408 3424 WerFault.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe"C:\Users\Admin\AppData\Local\Temp\159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe"1⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 97002⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3424 -ip 34241⤵PID:1084