Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe
Resource
win10v2004-20231222-en
General
-
Target
45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe
-
Size
2.6MB
-
MD5
38439fdf4744c8a97c0dafce36e4f432
-
SHA1
e6f56833ecfb2b47f4e39a290bad959776fea2f1
-
SHA256
45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503
-
SHA512
69feeaeb83ee5b6773e2919716d9ab2f4acee2f6115ef1731557258f42a5b529760402a091c64be1707a13c4b4cfb09e79ddb0eff24cd3e77fa1e4b355cda407
-
SSDEEP
49152:01+6+AFUaW+Vvdj8Lf8JtKHibnPIb2qohbLLkYPTRAEOOaS4d5eTovYuLL:XANzVvdw4Jr76oNLpPNAEkeTYpLL
Malware Config
Extracted
raccoon
2637bf45ccfc8a2d57025feab0be0b31
http://194.116.173.154:80
-
user_agent
MrBidenNeverKnow
Signatures
-
Raccoon Stealer V2 payload 4 IoCs
resource yara_rule behavioral2/memory/396-19-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral2/memory/396-23-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral2/memory/396-24-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral2/memory/396-25-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 -
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 4 IoCs
resource yara_rule behavioral2/memory/396-19-0x0000000000400000-0x0000000000416000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral2/memory/396-23-0x0000000000400000-0x0000000000416000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral2/memory/396-24-0x0000000000400000-0x0000000000416000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral2/memory/396-25-0x0000000000400000-0x0000000000416000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
Detects executables manipulated with Fody 1 IoCs
resource yara_rule behavioral2/memory/3856-0-0x0000000000A30000-0x0000000000CD4000-memory.dmp INDICATOR_EXE_Packed_Fody -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3856 set thread context of 396 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 87 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3856 wrote to memory of 428 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 84 PID 3856 wrote to memory of 428 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 84 PID 428 wrote to memory of 4976 428 csc.exe 86 PID 428 wrote to memory of 4976 428 csc.exe 86 PID 3856 wrote to memory of 396 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 87 PID 3856 wrote to memory of 396 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 87 PID 3856 wrote to memory of 396 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 87 PID 3856 wrote to memory of 396 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 87 PID 3856 wrote to memory of 396 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 87 PID 3856 wrote to memory of 396 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 87 PID 3856 wrote to memory of 396 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 87 PID 3856 wrote to memory of 396 3856 45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe"C:\Users\Admin\AppData\Local\Temp\45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\il2m1yiu\il2m1yiu.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES446B.tmp" "c:\Users\Admin\AppData\Local\Temp\il2m1yiu\CSC74CFEA0C53AD44AF9E1446CA7A75324A.TMP"3⤵PID:4976
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:396
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD570e597bd126a11172835009166c7f3d6
SHA1b42adf874b1cb577707ad64afadf654588e01818
SHA256ac159e62f1dca8cc2db78b6141015af40cf60b807d2f67f3456a36c53ca427f5
SHA5120a819437900979c352ca492026e0b6a7c1518456f7f364b262a16ab359b3c42e0702ac338726a63982e13cb719f8de88cefe2e7add59c5947a1b2c3f386edce1
-
Filesize
9KB
MD52952cc77228608aa092bc7ff1eb076db
SHA1f4f908b7a16b567fdfeeef91be5c1ae350e80323
SHA2561307d19947c56855eed752668094322fa13ee5ba5c8a0d5fd13b12f19164a857
SHA51236f4700637810ba6e652d66daadaa63fe1605cf9a83fdc6a28b00fce4e0078a3670390b7d0adfa15f5cd241538a1bba2052e222b8634c6d9a89e4bfdafa252aa
-
Filesize
652B
MD551d01bc78ab1bd069fd0f33202635dbc
SHA11c5453af0e094f08cd50f870282f4d4c1523e160
SHA2560b273e40cfe99010197e6ced191a270b683f5f2a202912843071370c8c57e7d9
SHA512d4e5444624485975b90d62624f8f514e6e5f367ba3b3c72554cf2549ba8156f626bbf19fed0bd2a2474569b1806cf20e07416e6d2d6cf5f03e49f010a156d261
-
Filesize
10KB
MD542cdf76cfeebaa4420881fdb1f349522
SHA1ef4d59c2b791a84ef78b60dba7ab1aec1b28be1d
SHA256463913a4eb1a1ec5b16cc0307e8e3910389e8505a224c695267eeed1c8d5b970
SHA512ed44f969cf64ef7c68df80d09f7c8f96c6e688649995c3e624dcd1638a456a8ef66cc535b40aab43a5679fc676dc62a2160cc49a5d8bc22c7df525bfc5520a7c
-
Filesize
204B
MD5e6cb712acdfb266b2af2e4d45c9cd193
SHA1669f8599a432d532a744acf1238ca29063f93a9d
SHA256a6cf95d1c95de700c0c7abe4d3163f9e1237be375111d430e2b4066e9ef18a0a
SHA512e86d21d36b8f7eb6785a648ad06077728247c3321b966d677b55a173436e0e950285faaba7e27cc17b28e68fa16c3672c634f37b063eef9a9ed265602b4dc11d