Analysis

  • max time kernel
    142s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 00:58

General

  • Target

    159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe

  • Size

    238KB

  • MD5

    8e16f708713d59a7764c78dc59b9b12a

  • SHA1

    ca33ab8943ae25fee116aed6e9b154e0e52035f7

  • SHA256

    159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010

  • SHA512

    055ffac712cb90d17d85c77b32b6b3a229a046cd5f63af546257b45142731045fddb0fffb9e0dabe77ec8519735fa6f0bba876f701e5f8f8280a0b529d7714c6

  • SSDEEP

    3072:bffu0FebfDTUilVw9WXgtjXGNgC9vGKo4Ek6miS5vfXTzj:D3eTUwO9WXobGNgAGn4EzwfXT

Malware Config

Extracted

Family

raccoon

Botnet

0da2e3700aa6f05465fdfc323d371488

C2

http://94.142.138.19:80

Attributes
  • user_agent

    GeekingToTheMoon

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 4 IoCs
  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe"
    1⤵
      PID:3424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 9700
        2⤵
        • Program crash
        PID:3408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3424 -ip 3424
      1⤵
        PID:1084

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3424-0-0x0000000002240000-0x0000000002255000-memory.dmp

        Filesize

        84KB

      • memory/3424-1-0x0000000002260000-0x000000000227A000-memory.dmp

        Filesize

        104KB

      • memory/3424-2-0x0000000000400000-0x00000000004ED000-memory.dmp

        Filesize

        948KB

      • memory/3424-3-0x0000000000400000-0x00000000004ED000-memory.dmp

        Filesize

        948KB

      • memory/3424-4-0x0000000002240000-0x0000000002255000-memory.dmp

        Filesize

        84KB

      • memory/3424-5-0x0000000002260000-0x000000000227A000-memory.dmp

        Filesize

        104KB