Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 17:44
Behavioral task
behavioral1
Sample
af175128a823db1274fc244d8f5a46bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af175128a823db1274fc244d8f5a46bd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$TEMP/lib_npp/libcef.dll
Resource
win7-20240221-en
General
-
Target
af175128a823db1274fc244d8f5a46bd.exe
-
Size
16.6MB
-
MD5
af175128a823db1274fc244d8f5a46bd
-
SHA1
9d67400fb5818a6c573c36eac8650458d7f1d07e
-
SHA256
fc10619c7cb6b5de6ba8f58fd3ff889045ef77ea4cde4de7c5f313dbef1a7bc3
-
SHA512
2fbd782242a4e57c2563cf4eb46d0bfca337839f126b93eca96a8c9a06377034336770c368da0c703ed2d7907f49d75b722dc688c461de1000e46c32368fe19f
-
SSDEEP
393216:7Q4l1FoGr1o4X3LKq/LnF+aOeuKAxt9zpaz3y6Jqx5mDsLOVEi:7Q4l1Fo455LnVupJpa2ADsKVT
Malware Config
Extracted
raccoon
1.7.3
6f477b98912ea3958a37585999397f4fbda5dc46
-
url4cnc
https://telete.in/chelmedvedosvin1
Signatures
-
Detect Blister loader x32 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll family_blister_x32 behavioral2/memory/1584-11-0x00000000727A0000-0x00000000745AF000-memory.dmp family_blister_x32 behavioral2/memory/1584-18-0x00000000727A0000-0x00000000745AF000-memory.dmp family_blister_x32 behavioral2/memory/1584-30-0x00000000727A0000-0x00000000745AF000-memory.dmp family_blister_x32 -
Raccoon Stealer V1 payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4308-23-0x0000000000440000-0x00000000004D5000-memory.dmp family_raccoon_v1 behavioral2/memory/4308-29-0x0000000000440000-0x00000000004D5000-memory.dmp family_raccoon_v1 -
Loads dropped DLL 1 IoCs
Processes:
af175128a823db1274fc244d8f5a46bd.exepid process 1584 af175128a823db1274fc244d8f5a46bd.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll vmprotect behavioral2/memory/1584-11-0x00000000727A0000-0x00000000745AF000-memory.dmp vmprotect behavioral2/memory/1584-18-0x00000000727A0000-0x00000000745AF000-memory.dmp vmprotect behavioral2/memory/1584-30-0x00000000727A0000-0x00000000745AF000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
af175128a823db1274fc244d8f5a46bd.exepid process 1584 af175128a823db1274fc244d8f5a46bd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
af175128a823db1274fc244d8f5a46bd.exedescription pid process target process PID 1584 set thread context of 4308 1584 af175128a823db1274fc244d8f5a46bd.exe af175128a823db1274fc244d8f5a46bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\ProgramData\Diagnostic asda\Diagnostic asda.exe nsis_installer_1 C:\ProgramData\Diagnostic asda\Diagnostic asda.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
af175128a823db1274fc244d8f5a46bd.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 af175128a823db1274fc244d8f5a46bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz af175128a823db1274fc244d8f5a46bd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
af175128a823db1274fc244d8f5a46bd.exepid process 1584 af175128a823db1274fc244d8f5a46bd.exe 1584 af175128a823db1274fc244d8f5a46bd.exe 1584 af175128a823db1274fc244d8f5a46bd.exe 1584 af175128a823db1274fc244d8f5a46bd.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
af175128a823db1274fc244d8f5a46bd.exedescription pid process target process PID 1584 wrote to memory of 4308 1584 af175128a823db1274fc244d8f5a46bd.exe af175128a823db1274fc244d8f5a46bd.exe PID 1584 wrote to memory of 4308 1584 af175128a823db1274fc244d8f5a46bd.exe af175128a823db1274fc244d8f5a46bd.exe PID 1584 wrote to memory of 4308 1584 af175128a823db1274fc244d8f5a46bd.exe af175128a823db1274fc244d8f5a46bd.exe PID 1584 wrote to memory of 4308 1584 af175128a823db1274fc244d8f5a46bd.exe af175128a823db1274fc244d8f5a46bd.exe PID 1584 wrote to memory of 4308 1584 af175128a823db1274fc244d8f5a46bd.exe af175128a823db1274fc244d8f5a46bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af175128a823db1274fc244d8f5a46bd.exe"C:\Users\Admin\AppData\Local\Temp\af175128a823db1274fc244d8f5a46bd.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\af175128a823db1274fc244d8f5a46bd.exe"C:\Users\Admin\AppData\Local\Temp\af175128a823db1274fc244d8f5a46bd.exe"2⤵PID:4308
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵PID:680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.6MB
MD5af175128a823db1274fc244d8f5a46bd
SHA19d67400fb5818a6c573c36eac8650458d7f1d07e
SHA256fc10619c7cb6b5de6ba8f58fd3ff889045ef77ea4cde4de7c5f313dbef1a7bc3
SHA5122fbd782242a4e57c2563cf4eb46d0bfca337839f126b93eca96a8c9a06377034336770c368da0c703ed2d7907f49d75b722dc688c461de1000e46c32368fe19f
-
Filesize
4.5MB
MD530a5948b530c1ab99d9447cf49a85ba7
SHA18fc474764bba52071f341414bba80d2631f7119a
SHA256b6257e73c78bfa1bed6df1f71e3a0ebe078e2f720d2de8c8c27a9aea7b69fbcb
SHA512934ef284b208e71728b0a7183ee1d86d548062d3fd48469eee1627b253d0567078185c46a4cb52a3c8df649b722858909dc86f22460e1badd521d12f65c1f0d4