Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2024, 20:02

General

  • Target

    aa09f49127a5463464d8740f0c067d92.exe

  • Size

    499KB

  • MD5

    aa09f49127a5463464d8740f0c067d92

  • SHA1

    1e6ce9da664630bd4b1bc609266a8a3420f8efca

  • SHA256

    fa6e884cc95814c6c3d70ad77dd5a60a18395ed71030383c3dea60bbbcc4a024

  • SHA512

    6c86d3ef97935c7a26ceffd6487ba5929eeb2f21abcd4b6de241447915803087acb4ffaf88b9d936537aaf8a0b5c03d2a7d6c47e802d952898720ceec1657d45

  • SSDEEP

    12288:ULb4I860ge47VAZ9bbei9EXmQhRv4AhbUIBPA:Ucg65b39EXDRvj/BPA

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa09f49127a5463464d8740f0c067d92.exe
    "C:\Users\Admin\AppData\Local\Temp\aa09f49127a5463464d8740f0c067d92.exe"
    1⤵
    • Modifies system certificate store
    PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2484-1-0x0000000000230000-0x0000000000330000-memory.dmp

    Filesize

    1024KB

  • memory/2484-2-0x00000000008F0000-0x0000000000983000-memory.dmp

    Filesize

    588KB

  • memory/2484-3-0x0000000000400000-0x00000000008E6000-memory.dmp

    Filesize

    4.9MB

  • memory/2484-4-0x0000000000400000-0x00000000008E6000-memory.dmp

    Filesize

    4.9MB

  • memory/2484-6-0x0000000000230000-0x0000000000330000-memory.dmp

    Filesize

    1024KB

  • memory/2484-7-0x00000000008F0000-0x0000000000983000-memory.dmp

    Filesize

    588KB