Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
cc21871feac73af45f4ea0164b06b212.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc21871feac73af45f4ea0164b06b212.exe
Resource
win10v2004-20240226-en
General
-
Target
cc21871feac73af45f4ea0164b06b212.exe
-
Size
624KB
-
MD5
cc21871feac73af45f4ea0164b06b212
-
SHA1
b099c026f0ab5532e816a6c80334726b3e0144a6
-
SHA256
1f4b4918ff51fa0b9958ae251f3cef25c4e0d2f6465a20d49b7fdd1ae2b7b959
-
SHA512
fa7a4cb1a81be0130f94a905ffaf1d56519f3ad3999e396d58e2c727253064876343fe7b7a3d7a315df098bfc44fda2dead3d27f7c7a703db417eab8426e4461
-
SSDEEP
12288:TdNEktR3/ceY8l/kZePnk9rS4e8nZzgRHVdz6DY7NqmE19NTAG5:HEkD/1/pkNe8a/0Y5ZcLAG5
Malware Config
Extracted
raccoon
1.7.3
510f3093b98732bac65cbd4f7437417970b5b119
-
url4cnc
https://telete.in/h_johng_1
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral1/memory/2556-4-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2556-6-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2556-8-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2556-9-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28 -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 cc21871feac73af45f4ea0164b06b212.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 cc21871feac73af45f4ea0164b06b212.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1724 cc21871feac73af45f4ea0164b06b212.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28 PID 1724 wrote to memory of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28 PID 1724 wrote to memory of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28 PID 1724 wrote to memory of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28 PID 1724 wrote to memory of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28 PID 1724 wrote to memory of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28 PID 1724 wrote to memory of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28 PID 1724 wrote to memory of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28 PID 1724 wrote to memory of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28 PID 1724 wrote to memory of 2556 1724 cc21871feac73af45f4ea0164b06b212.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc21871feac73af45f4ea0164b06b212.exe"C:\Users\Admin\AppData\Local\Temp\cc21871feac73af45f4ea0164b06b212.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\cc21871feac73af45f4ea0164b06b212.exeC:\Users\Admin\AppData\Local\Temp\cc21871feac73af45f4ea0164b06b212.exe2⤵
- Modifies system certificate store
PID:2556
-