Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 04:13

General

  • Target

    aaf9de09b8adbd974f872c18396f2a3b.exe

  • Size

    493KB

  • MD5

    aaf9de09b8adbd974f872c18396f2a3b

  • SHA1

    c5f53d34c9beec195d28d9164eed84f3522c7eac

  • SHA256

    fd74093053ea102cff3538ba984db276efe363ee18e49a4410185a55682e21e4

  • SHA512

    43d8dc8ea0c56fd4d297cc8cccf9cab4ce50c46a6e96625d532bc90e1b8a5c9e5e4a24383967a3ba7b8dbc1241374deddcb23d439dc7a41301e25329da9eb01f

  • SSDEEP

    12288:xcbY1EjsV16WOOoMHda/bf/ec2msXYka2MO3kAE:SYejTFgsT/Z2ZXzThE

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaf9de09b8adbd974f872c18396f2a3b.exe
    "C:\Users\Admin\AppData\Local\Temp\aaf9de09b8adbd974f872c18396f2a3b.exe"
    1⤵
    • Modifies system certificate store
    PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2040-1-0x0000000002CF0000-0x0000000002DF0000-memory.dmp

    Filesize

    1024KB

  • memory/2040-2-0x0000000002B90000-0x0000000002C1F000-memory.dmp

    Filesize

    572KB

  • memory/2040-3-0x0000000000400000-0x0000000002B86000-memory.dmp

    Filesize

    39.5MB

  • memory/2040-6-0x0000000002CF0000-0x0000000002DF0000-memory.dmp

    Filesize

    1024KB

  • memory/2040-7-0x0000000002B90000-0x0000000002C1F000-memory.dmp

    Filesize

    572KB