Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-03-2024 03:18

General

  • Target

    b11622f0ab180366686de3d7d4d1e007.exe

  • Size

    527KB

  • MD5

    b11622f0ab180366686de3d7d4d1e007

  • SHA1

    539472aa133586b27c555f63f067e75e48649348

  • SHA256

    d13dde4821d278b24f417bc51b39197789197ec45af4b9ac7fba05819209167c

  • SHA512

    47d8ec39ab7089d8b32b5086062d8294725ff05710b3548c1de63bda3e685cb1016d96e9bbd7fd550d5e6efaa187753f6339f229e5b2623bc68c61e0c4828e64

  • SSDEEP

    12288:Y3hcAi/xktuf+UcSlxDScqPb3ZuW9VYF3tC7Ga+u:H/xkmlBq/VYF3IR

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b11622f0ab180366686de3d7d4d1e007.exe
    "C:\Users\Admin\AppData\Local\Temp\b11622f0ab180366686de3d7d4d1e007.exe"
    1⤵
    • Modifies system certificate store
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2368-1-0x00000000025B0000-0x00000000026B0000-memory.dmp

    Filesize

    1024KB

  • memory/2368-2-0x0000000000220000-0x00000000002AF000-memory.dmp

    Filesize

    572KB

  • memory/2368-3-0x0000000000400000-0x00000000023EF000-memory.dmp

    Filesize

    31.9MB

  • memory/2368-6-0x00000000025B0000-0x00000000026B0000-memory.dmp

    Filesize

    1024KB

  • memory/2368-7-0x0000000000220000-0x00000000002AF000-memory.dmp

    Filesize

    572KB