Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 22:14

General

  • Target

    1e25784a4201e84c6624a3480a08fc66.exe

  • Size

    574KB

  • MD5

    1e25784a4201e84c6624a3480a08fc66

  • SHA1

    87179c0ef9978d5f989d8c5c87a4dbb33a568e56

  • SHA256

    ee2a69a595644abf1c49894aaca322801c83a124cec7656a0a5df69ad29c10fb

  • SHA512

    28718a5409984ae8de51cdefa29636929e9804395249044048cc4de337d91f8db483be4e7b8431404bce5f048ac7f01a1133c686e28f0646719bcd9f5dac9e39

  • SSDEEP

    12288:wH2JjEGg2qkg0ge+x4xs9SLWp3YoPItsp2OeaX59Y:lykg0L+Us95pOG2Oe1

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e25784a4201e84c6624a3480a08fc66.exe
    "C:\Users\Admin\AppData\Local\Temp\1e25784a4201e84c6624a3480a08fc66.exe"
    1⤵
    • Modifies system certificate store
    PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2140-1-0x0000000002280000-0x0000000002380000-memory.dmp

    Filesize

    1024KB

  • memory/2140-2-0x0000000000300000-0x000000000038F000-memory.dmp

    Filesize

    572KB

  • memory/2140-3-0x0000000000400000-0x00000000021AE000-memory.dmp

    Filesize

    29.7MB

  • memory/2140-6-0x0000000002280000-0x0000000002380000-memory.dmp

    Filesize

    1024KB

  • memory/2140-7-0x0000000000300000-0x000000000038F000-memory.dmp

    Filesize

    572KB