Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2024, 02:29

General

  • Target

    af8d9df4f6177a4c64338f8087b4ccac.exe

  • Size

    461KB

  • MD5

    af8d9df4f6177a4c64338f8087b4ccac

  • SHA1

    d725065c7af2ddbe47da65bc583d2f8ef17ae70f

  • SHA256

    baf687b8507fab71eb83880c2080d048ade46973bd30ba69ae400a256cb54440

  • SHA512

    adbb8b98c06adfc2428247d703a3471ae17498ecee90b8a5fd8ad1b45c0513a68411918b6434fab2279a655a14a3c22e702ae1e0ea807c5bff87092d1bf2269d

  • SSDEEP

    12288:trYLvypNr328ej841QH+FpmyjuQOwT4YOQdi:trYLC7jejfQscxQOw9i

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs
  • Program crash 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af8d9df4f6177a4c64338f8087b4ccac.exe
    "C:\Users\Admin\AppData\Local\Temp\af8d9df4f6177a4c64338f8087b4ccac.exe"
    1⤵
      PID:4992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 744
        2⤵
        • Program crash
        PID:3220
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 780
        2⤵
        • Program crash
        PID:4804
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 760
        2⤵
        • Program crash
        PID:2376
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 888
        2⤵
        • Program crash
        PID:4556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 1164
        2⤵
        • Program crash
        PID:1032
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 1140
        2⤵
        • Program crash
        PID:1400
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4992 -ip 4992
      1⤵
        PID:3436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4992 -ip 4992
        1⤵
          PID:3980
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4992 -ip 4992
          1⤵
            PID:4376
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4992 -ip 4992
            1⤵
              PID:3908
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4992 -ip 4992
              1⤵
                PID:2140
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4992 -ip 4992
                1⤵
                  PID:4368

                Network

                MITRE ATT&CK Matrix

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/4992-1-0x0000000002FF0000-0x00000000030F0000-memory.dmp

                  Filesize

                  1024KB

                • memory/4992-2-0x0000000004A90000-0x0000000004B21000-memory.dmp

                  Filesize

                  580KB

                • memory/4992-3-0x0000000000400000-0x0000000002CA9000-memory.dmp

                  Filesize

                  40.7MB

                • memory/4992-4-0x0000000000400000-0x0000000002CA9000-memory.dmp

                  Filesize

                  40.7MB

                • memory/4992-6-0x0000000002FF0000-0x00000000030F0000-memory.dmp

                  Filesize

                  1024KB

                • memory/4992-7-0x0000000004A90000-0x0000000004B21000-memory.dmp

                  Filesize

                  580KB