Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 09:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cb04ee69ca77611d15bf1cb1c3a37b52.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
cb04ee69ca77611d15bf1cb1c3a37b52.exe
-
Size
1.5MB
-
MD5
cb04ee69ca77611d15bf1cb1c3a37b52
-
SHA1
90c0923fcd672c7cbe4079cde5d08641edde65ea
-
SHA256
3ab7eca908cbfcc0aefea517b4482efbe5c0e7c6c55b23ae3d05125fb5cc29e4
-
SHA512
a0f291450390a7dbaa4479fdd4f62fa26057a2ac5376569900accac744c775aceb346dad4c62c164f5ffb31b30fb4ae778a0b100465f5699bf1b965de51f44bd
-
SSDEEP
24576:OG++PWQamhejtodtzcodFukj/gfsEBQetmbf8GfPLg:r/2odtcodf/gsGQewbUGfP
Malware Config
Signatures
-
Raccoon Stealer V1 payload 14 IoCs
resource yara_rule behavioral1/memory/1252-1-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-2-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-3-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-4-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-5-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-6-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-7-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-8-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-9-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-10-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-11-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-12-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-13-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 behavioral1/memory/1252-14-0x0000000000350000-0x0000000000786000-memory.dmp family_raccoon_v1 -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 cb04ee69ca77611d15bf1cb1c3a37b52.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 cb04ee69ca77611d15bf1cb1c3a37b52.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1252 cb04ee69ca77611d15bf1cb1c3a37b52.exe