Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 15:06

General

  • Target

    ac2cbac54f9d8388529b12a727d4e441.exe

  • Size

    5.2MB

  • MD5

    ac2cbac54f9d8388529b12a727d4e441

  • SHA1

    76b8ae3e5996241ca1b4f378e3418125b894032c

  • SHA256

    bc458042cf51dca5781a9e1da79b5a40103dcdd3b12496321cfdaf13ce85c93c

  • SHA512

    2aa65e051e85afe221bea0cceaab938949d7f06dea0ee2fc638c78c2bbc344a1e5e639a1fc3d7c136ce2ab43a61a7162a9da3e8df82462955214b3dbcafad46f

  • SSDEEP

    98304:aT6Fnxh0AGsqUunZoQtc0HhADH6DXWVyJAOp6N8gA5bO:ok5bbuaOVHWT6b9JXpNg+bO

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac2cbac54f9d8388529b12a727d4e441.exe
    "C:\Users\Admin\AppData\Local\Temp\ac2cbac54f9d8388529b12a727d4e441.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1956-0-0x0000000000400000-0x0000000000C91000-memory.dmp

    Filesize

    8.6MB

  • memory/1956-2-0x0000000000400000-0x0000000000C91000-memory.dmp

    Filesize

    8.6MB

  • memory/1956-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1956-9-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1956-7-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1956-6-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1956-11-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1956-12-0x0000000000400000-0x0000000000C91000-memory.dmp

    Filesize

    8.6MB

  • memory/1956-4-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1956-13-0x0000000077830000-0x0000000077831000-memory.dmp

    Filesize

    4KB

  • memory/1956-16-0x0000000000400000-0x0000000000C91000-memory.dmp

    Filesize

    8.6MB