Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
29-11-2023 16:50
Static task
static1
Behavioral task
behavioral1
Sample
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe
Resource
win10v2004-20231127-en
General
-
Target
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe
-
Size
17.1MB
-
MD5
609aae1b7204c854d660c22179ece445
-
SHA1
897ac7d1a4583d4a57ee9b6f045e13bcc89b0229
-
SHA256
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751
-
SHA512
5602d7ece0d0ca7e94bc348b3b6284d45dc0cf31982eedd54ea3f5fdc860a00be5a61eb0d4d89410f549fd29b156511085ec16af8a1fc43f0ee2aa5a14f2b9ab
-
SSDEEP
393216:LymUDdRkuhbXo8u8jMB5yU9sWwOExGTkuRe1jkgIBN1:2m6bdoOjeQUKZ7AIuRe1uBN
Malware Config
Extracted
raccoon
d4dfe058bb722373a292317097b425f0
http://37.49.230.54:80
http://37.49.230.152:80
-
user_agent
GeekingToTheMoon
Signatures
-
Raccoon Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1716-3-0x0000000000400000-0x0000000001EE7000-memory.dmp family_raccoon behavioral1/memory/1716-9-0x0000000000400000-0x0000000001EE7000-memory.dmp family_raccoon behavioral1/memory/1716-46-0x0000000000400000-0x0000000001EE7000-memory.dmp family_raccoon -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exepid process 1716 8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe 1716 8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exepid process 1716 8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe"C:\Users\Admin\AppData\Local\Temp\8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1716