Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2023 10:52
Behavioral task
behavioral1
Sample
CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe
Resource
win7-20231025-en
windows7-x64
10 signatures
150 seconds
General
-
Target
CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe
-
Size
2.7MB
-
MD5
916e98f8de39ebb4272782de0d79b20d
-
SHA1
cf8f1d1d80b2a05693994d5a5d4d362e8c5a272e
-
SHA256
ca9bf1fdf967f8f859646098b06970c85907228f2767f613a8622884ecb16612
-
SHA512
a9ce8a8f8676110354cd4de785b6c4c455ac4c4ae41acba41575f2d5a1ee17e4d763281ea6107457680196ac1ced3f5a80ec4c794e5c462c18cb5ce9a055a0eb
-
SSDEEP
49152:fZTmOKzejxEfav+cv+WD1NrYG2812Pwm3bUEERJawyYTG:frKz/a2cWWpNH2811+pE3Ew
Malware Config
Extracted
Family
raccoon
Botnet
1c2981de60c0167871c96a32a107ba2f
C2
http://5.45.85.201:80/
Attributes
-
user_agent
SunShineMoonLight
xor.plain
Signatures
-
Raccoon Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/64-0-0x0000000000400000-0x0000000000ACA000-memory.dmp family_raccoon behavioral2/memory/64-2-0x0000000000400000-0x0000000000ACA000-memory.dmp family_raccoon -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe -
resource yara_rule behavioral2/memory/64-0-0x0000000000400000-0x0000000000ACA000-memory.dmp themida behavioral2/memory/64-2-0x0000000000400000-0x0000000000ACA000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 64 CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2312 64 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 64 CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe 64 CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe"C:\Users\Admin\AppData\Local\Temp\CA9BF1FDF967F8F859646098B06970C85907228F2767F.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 97402⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 64 -ip 641⤵PID:4640