Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 04:34

General

  • Target

    c4fcb97e9635fdfaa31d3d9566cecea4.exe

  • Size

    2.2MB

  • MD5

    c4fcb97e9635fdfaa31d3d9566cecea4

  • SHA1

    7b935560a4a90c2fee2c3454cf7840f114c63600

  • SHA256

    37b701a787a3ee7b5f4e58bc2cc7f4ea3fb1552a376f3b60c79c638a30e53b7d

  • SHA512

    e8878a5e7f6899668f4d6c1121d0fe09324ea47b843883999bb4f4a166364075dfe07ab9b1a0133fa86703dd7c8195e2de6c2b70974625b4d45dfe1c521fd9a8

  • SSDEEP

    49152:oKoHcIV2QVj49QlFg6WVJLu830aeJvLZrok:oKoHcZQVjpFgk83iJvLZrok

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

7cd90ae238d66db40c22016c38bbfed9c6a5fb40

Attributes
  • url4cnc

    https://telete.in/jredmankun

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4fcb97e9635fdfaa31d3d9566cecea4.exe
    "C:\Users\Admin\AppData\Local\Temp\c4fcb97e9635fdfaa31d3d9566cecea4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\c4fcb97e9635fdfaa31d3d9566cecea4.exe
      "C:\Users\Admin\AppData\Local\Temp\c4fcb97e9635fdfaa31d3d9566cecea4.exe"
      2⤵
        PID:3752
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4816

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2268-8-0x0000000074BF0000-0x00000000753A0000-memory.dmp

        Filesize

        7.7MB

      • memory/2268-10-0x0000000001680000-0x00000000016B6000-memory.dmp

        Filesize

        216KB

      • memory/2268-2-0x0000000005B40000-0x0000000005BDC000-memory.dmp

        Filesize

        624KB

      • memory/2268-3-0x00000000061C0000-0x0000000006764000-memory.dmp

        Filesize

        5.6MB

      • memory/2268-4-0x0000000005CB0000-0x0000000005D42000-memory.dmp

        Filesize

        584KB

      • memory/2268-5-0x0000000005C30000-0x0000000005C40000-memory.dmp

        Filesize

        64KB

      • memory/2268-6-0x0000000005C60000-0x0000000005C6A000-memory.dmp

        Filesize

        40KB

      • memory/2268-7-0x0000000005EC0000-0x0000000005F16000-memory.dmp

        Filesize

        344KB

      • memory/2268-1-0x0000000000F90000-0x00000000011C0000-memory.dmp

        Filesize

        2.2MB

      • memory/2268-0-0x0000000074BF0000-0x00000000753A0000-memory.dmp

        Filesize

        7.7MB

      • memory/2268-9-0x0000000005C30000-0x0000000005C40000-memory.dmp

        Filesize

        64KB

      • memory/2268-12-0x0000000007050000-0x0000000007134000-memory.dmp

        Filesize

        912KB

      • memory/2268-13-0x000000000F800000-0x000000000F89C000-memory.dmp

        Filesize

        624KB

      • memory/2268-19-0x0000000074BF0000-0x00000000753A0000-memory.dmp

        Filesize

        7.7MB

      • memory/3752-15-0x0000000000400000-0x0000000000495000-memory.dmp

        Filesize

        596KB

      • memory/3752-17-0x0000000000400000-0x0000000000495000-memory.dmp

        Filesize

        596KB

      • memory/3752-18-0x0000000000400000-0x0000000000495000-memory.dmp

        Filesize

        596KB

      • memory/3752-14-0x0000000000400000-0x0000000000495000-memory.dmp

        Filesize

        596KB