Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 19:24
Static task
static1
Behavioral task
behavioral1
Sample
8334fb6c79b105346c5818c1b07ef489.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8334fb6c79b105346c5818c1b07ef489.exe
Resource
win10v2004-20231215-en
General
-
Target
8334fb6c79b105346c5818c1b07ef489.exe
-
Size
968KB
-
MD5
8334fb6c79b105346c5818c1b07ef489
-
SHA1
c5aa12b7887eb5edff411f7f0c30760b740804ae
-
SHA256
4e1a08f808a281378cc6dd3bcdd56901dd23450ad2d75eb103c17ad10787dff3
-
SHA512
4f992038e51dfde5385f883ebfb8fc6f841e167bcebde3ef684e3602d7a313569a2fe6de449b892124d0df4f0e7ee1330af03193ce42af72c80d46513848ca60
-
SSDEEP
24576:GBrF5E3A9TcdekDnFjQohahKgXjZaj51ldq6O2aZeKBpFtlp32aky2aAr:Uc3A94gkDnFjzahTXj4HqgUXLmdfVr
Malware Config
Extracted
raccoon
1.8.2
728e62b0300799f2a8741c39a71a1543c6759e8d
-
url4cnc
http://teletop.top/brikitiki
http://teleta.top/brikitiki
https://t.me/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
scarsa.ac.ug
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon Stealer V1 payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/4184-34-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral2/memory/4184-38-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral2/memory/4184-40-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral2/memory/4184-48-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral2/memory/4184-63-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/4184-64-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8334fb6c79b105346c5818c1b07ef489.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 8334fb6c79b105346c5818c1b07ef489.exe -
Executes dropped EXE 4 IoCs
Processes:
vcDvxcsfd.exedaaace.exedaaace.exevcDvxcsfd.exepid process 3764 vcDvxcsfd.exe 4540 daaace.exe 2196 daaace.exe 4808 vcDvxcsfd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
8334fb6c79b105346c5818c1b07ef489.exedaaace.exevcDvxcsfd.exedescription pid process target process PID 1424 set thread context of 4184 1424 8334fb6c79b105346c5818c1b07ef489.exe 8334fb6c79b105346c5818c1b07ef489.exe PID 4540 set thread context of 2196 4540 daaace.exe daaace.exe PID 3764 set thread context of 4808 3764 vcDvxcsfd.exe vcDvxcsfd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4472 4808 WerFault.exe vcDvxcsfd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
8334fb6c79b105346c5818c1b07ef489.exedaaace.exevcDvxcsfd.exepid process 1424 8334fb6c79b105346c5818c1b07ef489.exe 4540 daaace.exe 3764 vcDvxcsfd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
8334fb6c79b105346c5818c1b07ef489.exevcDvxcsfd.exedaaace.exepid process 1424 8334fb6c79b105346c5818c1b07ef489.exe 3764 vcDvxcsfd.exe 4540 daaace.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
8334fb6c79b105346c5818c1b07ef489.exedaaace.exevcDvxcsfd.exedescription pid process target process PID 1424 wrote to memory of 3764 1424 8334fb6c79b105346c5818c1b07ef489.exe vcDvxcsfd.exe PID 1424 wrote to memory of 3764 1424 8334fb6c79b105346c5818c1b07ef489.exe vcDvxcsfd.exe PID 1424 wrote to memory of 3764 1424 8334fb6c79b105346c5818c1b07ef489.exe vcDvxcsfd.exe PID 1424 wrote to memory of 4540 1424 8334fb6c79b105346c5818c1b07ef489.exe daaace.exe PID 1424 wrote to memory of 4540 1424 8334fb6c79b105346c5818c1b07ef489.exe daaace.exe PID 1424 wrote to memory of 4540 1424 8334fb6c79b105346c5818c1b07ef489.exe daaace.exe PID 1424 wrote to memory of 4184 1424 8334fb6c79b105346c5818c1b07ef489.exe 8334fb6c79b105346c5818c1b07ef489.exe PID 1424 wrote to memory of 4184 1424 8334fb6c79b105346c5818c1b07ef489.exe 8334fb6c79b105346c5818c1b07ef489.exe PID 1424 wrote to memory of 4184 1424 8334fb6c79b105346c5818c1b07ef489.exe 8334fb6c79b105346c5818c1b07ef489.exe PID 4540 wrote to memory of 2196 4540 daaace.exe daaace.exe PID 4540 wrote to memory of 2196 4540 daaace.exe daaace.exe PID 4540 wrote to memory of 2196 4540 daaace.exe daaace.exe PID 1424 wrote to memory of 4184 1424 8334fb6c79b105346c5818c1b07ef489.exe 8334fb6c79b105346c5818c1b07ef489.exe PID 4540 wrote to memory of 2196 4540 daaace.exe daaace.exe PID 3764 wrote to memory of 4808 3764 vcDvxcsfd.exe vcDvxcsfd.exe PID 3764 wrote to memory of 4808 3764 vcDvxcsfd.exe vcDvxcsfd.exe PID 3764 wrote to memory of 4808 3764 vcDvxcsfd.exe vcDvxcsfd.exe PID 3764 wrote to memory of 4808 3764 vcDvxcsfd.exe vcDvxcsfd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8334fb6c79b105346c5818c1b07ef489.exe"C:\Users\Admin\AppData\Local\Temp\8334fb6c79b105346c5818c1b07ef489.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\vcDvxcsfd.exe"C:\Users\Admin\AppData\Local\Temp\vcDvxcsfd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\vcDvxcsfd.exe"C:\Users\Admin\AppData\Local\Temp\vcDvxcsfd.exe"3⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 12964⤵
- Program crash
PID:4472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaace.exe"C:\Users\Admin\AppData\Local\Temp\daaace.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\daaace.exe"C:\Users\Admin\AppData\Local\Temp\daaace.exe"3⤵
- Executes dropped EXE
PID:2196
-
-
-
C:\Users\Admin\AppData\Local\Temp\8334fb6c79b105346c5818c1b07ef489.exe"C:\Users\Admin\AppData\Local\Temp\8334fb6c79b105346c5818c1b07ef489.exe"2⤵PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4808 -ip 48081⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD533d5a63af1a39c07481cde5637aced88
SHA18e30aab7a56c338d1b82baf8c1acd1513e450400
SHA256e473349aa6cb86e5c6bf574872912cc2d3e2d2f0eb86dc304c3be22248c03a2b
SHA51293a7682d540f984d7ee4b161dc4dc4abd1222b0a0ff4b1998eb457c962f907893d8f29f2091302b559080747a56d4b24b7806c3081de779c5a92b9d282743dfc
-
Filesize
248KB
MD528911267f7db0fbdec9a4efae56e4f35
SHA139ad01109f81e0177c8b88132e677dade0f998e1
SHA2565d9e9eec843781fcd39a0dfe23f9b9b6468cbf23ca327e1acedf8567b612cd38
SHA5127eb8916eb81b4866f73bb78f1f5651cd483fa46017f7f86e993d9fb882732c2f8e2878fe2c68ce3a75e364cf181f2da23f3904dfe9a58e08713d81731927844a