Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28-11-2023 20:36
Static task
static1
Behavioral task
behavioral1
Sample
8504046C2EA601460E42D3A1CA05020CC49316A9DFA53.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8504046C2EA601460E42D3A1CA05020CC49316A9DFA53.exe
Resource
win10v2004-20231127-en
General
-
Target
8504046C2EA601460E42D3A1CA05020CC49316A9DFA53.exe
-
Size
17.1MB
-
MD5
609aae1b7204c854d660c22179ece445
-
SHA1
897ac7d1a4583d4a57ee9b6f045e13bcc89b0229
-
SHA256
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751
-
SHA512
5602d7ece0d0ca7e94bc348b3b6284d45dc0cf31982eedd54ea3f5fdc860a00be5a61eb0d4d89410f549fd29b156511085ec16af8a1fc43f0ee2aa5a14f2b9ab
-
SSDEEP
393216:LymUDdRkuhbXo8u8jMB5yU9sWwOExGTkuRe1jkgIBN1:2m6bdoOjeQUKZ7AIuRe1uBN
Malware Config
Extracted
raccoon
d4dfe058bb722373a292317097b425f0
http://37.49.230.54:80
http://37.49.230.152:80
-
user_agent
GeekingToTheMoon
Signatures
-
Raccoon Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2112-2-0x0000000000400000-0x0000000001EE7000-memory.dmp family_raccoon behavioral1/memory/2112-8-0x0000000000400000-0x0000000001EE7000-memory.dmp family_raccoon behavioral1/memory/2112-46-0x0000000000400000-0x0000000001EE7000-memory.dmp family_raccoon -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
8504046C2EA601460E42D3A1CA05020CC49316A9DFA53.exepid process 2112 8504046C2EA601460E42D3A1CA05020CC49316A9DFA53.exe 2112 8504046C2EA601460E42D3A1CA05020CC49316A9DFA53.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8504046C2EA601460E42D3A1CA05020CC49316A9DFA53.exepid process 2112 8504046C2EA601460E42D3A1CA05020CC49316A9DFA53.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2112-0-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2112-3-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2112-2-0x0000000000400000-0x0000000001EE7000-memory.dmpFilesize
26.9MB
-
memory/2112-5-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2112-6-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2112-8-0x0000000000400000-0x0000000001EE7000-memory.dmpFilesize
26.9MB
-
memory/2112-10-0x0000000077840000-0x0000000077841000-memory.dmpFilesize
4KB
-
memory/2112-9-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2112-12-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2112-13-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2112-15-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2112-30-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2112-27-0x0000000000380000-0x0000000000381000-memory.dmpFilesize
4KB
-
memory/2112-25-0x0000000000380000-0x0000000000381000-memory.dmpFilesize
4KB
-
memory/2112-22-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/2112-32-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2112-20-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/2112-18-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/2112-17-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2112-35-0x00000000003A0000-0x00000000003A1000-memory.dmpFilesize
4KB
-
memory/2112-42-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/2112-40-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/2112-37-0x00000000003A0000-0x00000000003A1000-memory.dmpFilesize
4KB
-
memory/2112-46-0x0000000000400000-0x0000000001EE7000-memory.dmpFilesize
26.9MB