Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 19:37

General

  • Target

    cc40449c2c37c010f5eaa9b1eca01c6f.exe

  • Size

    516KB

  • MD5

    cc40449c2c37c010f5eaa9b1eca01c6f

  • SHA1

    488edf39c3c85da6dc7f92307874799dbfc6e823

  • SHA256

    dae96eed94ff74e5ebafaaa9139f0729228775934528e06dba194bace30cf807

  • SHA512

    5007bfb34705cb0193f376d445108c45ae63bf74e4b169d97f8ee08dfe69c0c7af72f082942bb5dbdbb89b376984ed8adf25146f9f06c31f1a65a8e5752ef38a

  • SSDEEP

    12288:HkT3mGykelpbOSRHcAtdKYUG4/RZ0bjR/XG8G7:+mGykBwHYNJZYR/XG8G

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc40449c2c37c010f5eaa9b1eca01c6f.exe
    "C:\Users\Admin\AppData\Local\Temp\cc40449c2c37c010f5eaa9b1eca01c6f.exe"
    1⤵
      PID:4832

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4832-1-0x0000000002760000-0x0000000002860000-memory.dmp

      Filesize

      1024KB

    • memory/4832-2-0x00000000026A0000-0x000000000272E000-memory.dmp

      Filesize

      568KB

    • memory/4832-3-0x0000000000400000-0x00000000023EA000-memory.dmp

      Filesize

      31.9MB

    • memory/4832-4-0x0000000000400000-0x00000000023EA000-memory.dmp

      Filesize

      31.9MB

    • memory/4832-6-0x0000000002760000-0x0000000002860000-memory.dmp

      Filesize

      1024KB

    • memory/4832-7-0x00000000026A0000-0x000000000272E000-memory.dmp

      Filesize

      568KB