Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
29-11-2023 16:51
Static task
static1
Behavioral task
behavioral1
Sample
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe
Resource
win10v2004-20231127-en
General
-
Target
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe
-
Size
17.1MB
-
MD5
609aae1b7204c854d660c22179ece445
-
SHA1
897ac7d1a4583d4a57ee9b6f045e13bcc89b0229
-
SHA256
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751
-
SHA512
5602d7ece0d0ca7e94bc348b3b6284d45dc0cf31982eedd54ea3f5fdc860a00be5a61eb0d4d89410f549fd29b156511085ec16af8a1fc43f0ee2aa5a14f2b9ab
-
SSDEEP
393216:LymUDdRkuhbXo8u8jMB5yU9sWwOExGTkuRe1jkgIBN1:2m6bdoOjeQUKZ7AIuRe1uBN
Malware Config
Extracted
raccoon
d4dfe058bb722373a292317097b425f0
http://37.49.230.54:80
http://37.49.230.152:80
-
user_agent
GeekingToTheMoon
Signatures
-
Raccoon Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2960-0-0x0000000000400000-0x0000000001EE7000-memory.dmp family_raccoon behavioral1/memory/2960-8-0x0000000000400000-0x0000000001EE7000-memory.dmp family_raccoon behavioral1/memory/2960-46-0x0000000000400000-0x0000000001EE7000-memory.dmp family_raccoon -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exepid process 2960 8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe 2960 8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exepid process 2960 8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe"C:\Users\Admin\AppData\Local\Temp\8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2960-0-0x0000000000400000-0x0000000001EE7000-memory.dmpFilesize
26.9MB
-
memory/2960-1-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2960-3-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2960-5-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2960-6-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2960-8-0x0000000000400000-0x0000000001EE7000-memory.dmpFilesize
26.9MB
-
memory/2960-10-0x0000000077B80000-0x0000000077B81000-memory.dmpFilesize
4KB
-
memory/2960-9-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2960-12-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2960-13-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2960-17-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2960-35-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/2960-37-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/2960-42-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2960-40-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2960-32-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2960-30-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2960-27-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2960-25-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2960-22-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2960-20-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2960-18-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2960-15-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2960-46-0x0000000000400000-0x0000000001EE7000-memory.dmpFilesize
26.9MB