Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 11:03

General

  • Target

    b73fa3e75f70194c44b8faf4fa4d16bb.exe

  • Size

    461KB

  • MD5

    b73fa3e75f70194c44b8faf4fa4d16bb

  • SHA1

    36740e42b739b8a2e61b1132c641dc8be0007164

  • SHA256

    f5e61fcc4300b16d273ba8e0a957ad8cc89f757d5329409cfed0dea6ae64c322

  • SHA512

    faa7e4348cc37b613026d49dba804bdf5fd39c718acec14b6db0b3d117a049c4e048ddb581ede5a32bdcda8e50ff33cb97cdfbefe4fb7475f0ec22905bb228f8

  • SSDEEP

    12288:B1u2mEC1GIxKJXRZbLlFQ2kSGCsSyGVgqsMNO/i:62mEUKhjlFT1dybri

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b73fa3e75f70194c44b8faf4fa4d16bb.exe
    "C:\Users\Admin\AppData\Local\Temp\b73fa3e75f70194c44b8faf4fa4d16bb.exe"
    1⤵
    • Modifies system certificate store
    PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2012-2-0x0000000000230000-0x00000000002BF000-memory.dmp

    Filesize

    572KB

  • memory/2012-1-0x0000000002E90000-0x0000000002F90000-memory.dmp

    Filesize

    1024KB

  • memory/2012-3-0x0000000000400000-0x0000000002D01000-memory.dmp

    Filesize

    41.0MB

  • memory/2012-4-0x0000000000400000-0x0000000002D01000-memory.dmp

    Filesize

    41.0MB

  • memory/2012-7-0x0000000000230000-0x00000000002BF000-memory.dmp

    Filesize

    572KB

  • memory/2012-6-0x0000000002E90000-0x0000000002F90000-memory.dmp

    Filesize

    1024KB