Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2024, 22:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a78a2957230c0c94175b04c4509f4017.exe
Resource
win7-20240220-en
3 signatures
150 seconds
General
-
Target
a78a2957230c0c94175b04c4509f4017.exe
-
Size
518KB
-
MD5
a78a2957230c0c94175b04c4509f4017
-
SHA1
55b7efac70ae421582950739c7b74036bc4de8d1
-
SHA256
bc71610c3b7d19fdc84bce97242d50a87cfe846709363ddcb20fc3eb5327c6ab
-
SHA512
6b2793d1844b28959b603f431d21582aaeaf58ab440dff142d4e15b5b49870385bd8f84155ae28e38b080a368705abb513e5f99e6eefd7e274e802103678c3d4
-
SSDEEP
6144:WWmaFFX29i1SHLUYZLBAWExH4bENIR1u6p/QUsBitI6vk2JQDSatGIYdLu7iJmG7:1J29i1S4YZlAn1kXHs46oQ2aE7LNbU3
Malware Config
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral2/memory/4652-2-0x00000000049B0000-0x0000000004A3F000-memory.dmp family_raccoon_v1 behavioral2/memory/4652-3-0x0000000000400000-0x0000000002B8D000-memory.dmp family_raccoon_v1 behavioral2/memory/4652-4-0x0000000000400000-0x0000000002B8D000-memory.dmp family_raccoon_v1 behavioral2/memory/4652-5-0x0000000000400000-0x0000000002B8D000-memory.dmp family_raccoon_v1 behavioral2/memory/4652-8-0x00000000049B0000-0x0000000004A3F000-memory.dmp family_raccoon_v1
Processes
-
C:\Users\Admin\AppData\Local\Temp\a78a2957230c0c94175b04c4509f4017.exe"C:\Users\Admin\AppData\Local\Temp\a78a2957230c0c94175b04c4509f4017.exe"1⤵PID:4652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1400 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:4668