Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
cd2dda475065ca19a87fef773d29837c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cd2dda475065ca19a87fef773d29837c.exe
Resource
win10v2004-20240226-en
General
-
Target
cd2dda475065ca19a87fef773d29837c.exe
-
Size
1.5MB
-
MD5
cd2dda475065ca19a87fef773d29837c
-
SHA1
03681c4ba67b25814f388a9ec2331681a104da06
-
SHA256
86be7e271ff5976401fab7697d671398ce7612b461326b60bd7c5cf82d5dd413
-
SHA512
bc1a0d0ce804415a7ad6b35ce738145d2417c21bb53c6d803864fc67d96e8dd79b4cb17edd3dd149cdefaf36a9772a21fea1c092bfd73eeea1ee0942d64f7402
-
SSDEEP
24576:u7WyfNGtTHMF+WNxccRzp6RXiAmJD+1ueBUUIYkBC:oHGBsF+SxF96hiVC1zBUhA
Malware Config
Extracted
raccoon
1.7.3
7ffdc0de40d09810438d04c4d2b8f65bca253baf
-
url4cnc
https://telete.in/happyteslafalcon
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral2/memory/3316-30-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/3316-32-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/3316-33-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/3316-34-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/3316-35-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cd2dda475065ca19a87fef773d29837c.exe -
Executes dropped EXE 3 IoCs
pid Process 3936 Ingranditi.exe.com 4064 Ingranditi.exe.com 3316 ipconfig.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4064 set thread context of 3316 4064 Ingranditi.exe.com 119 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3316 ipconfig.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2288 PING.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com 4064 Ingranditi.exe.com -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4064 Ingranditi.exe.com -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1892 2072 cd2dda475065ca19a87fef773d29837c.exe 98 PID 2072 wrote to memory of 1892 2072 cd2dda475065ca19a87fef773d29837c.exe 98 PID 2072 wrote to memory of 1892 2072 cd2dda475065ca19a87fef773d29837c.exe 98 PID 1892 wrote to memory of 4684 1892 cmd.exe 100 PID 1892 wrote to memory of 4684 1892 cmd.exe 100 PID 1892 wrote to memory of 4684 1892 cmd.exe 100 PID 4684 wrote to memory of 4068 4684 cmd.exe 101 PID 4684 wrote to memory of 4068 4684 cmd.exe 101 PID 4684 wrote to memory of 4068 4684 cmd.exe 101 PID 4684 wrote to memory of 3936 4684 cmd.exe 102 PID 4684 wrote to memory of 3936 4684 cmd.exe 102 PID 4684 wrote to memory of 3936 4684 cmd.exe 102 PID 4684 wrote to memory of 2288 4684 cmd.exe 103 PID 4684 wrote to memory of 2288 4684 cmd.exe 103 PID 4684 wrote to memory of 2288 4684 cmd.exe 103 PID 3936 wrote to memory of 4064 3936 Ingranditi.exe.com 105 PID 3936 wrote to memory of 4064 3936 Ingranditi.exe.com 105 PID 3936 wrote to memory of 4064 3936 Ingranditi.exe.com 105 PID 2072 wrote to memory of 2352 2072 cd2dda475065ca19a87fef773d29837c.exe 115 PID 2072 wrote to memory of 2352 2072 cd2dda475065ca19a87fef773d29837c.exe 115 PID 2072 wrote to memory of 2352 2072 cd2dda475065ca19a87fef773d29837c.exe 115 PID 4064 wrote to memory of 3316 4064 Ingranditi.exe.com 119 PID 4064 wrote to memory of 3316 4064 Ingranditi.exe.com 119 PID 4064 wrote to memory of 3316 4064 Ingranditi.exe.com 119 PID 4064 wrote to memory of 3316 4064 Ingranditi.exe.com 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd2dda475065ca19a87fef773d29837c.exe"C:\Users\Admin\AppData\Local\Temp\cd2dda475065ca19a87fef773d29837c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Chiamando.html2⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^vMTXZfRbDiFjhouYfDZWbLTTynJzpkQjrEXNpogAoVarczDEuNhSnblKTZSAFngsszpJkzPifnOBzPnMVtjcXXNGzhTpfNVJHwMelTzMXuCZJJsrBuFAkSzzFCdXm$" Sua.html4⤵PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ingranditi.exe.comIngranditi.exe.com e4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ingranditi.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ingranditi.exe.com e5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ipconfig.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ipconfig.exe6⤵
- Executes dropped EXE
- Gathers network information
PID:3316
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:2288
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:4576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236B
MD5482ea5218dc27fe127c61acc6f16f8a0
SHA1a9673286ce59d239ffc2ce996d1f774acb248598
SHA25631cebffba2768bc1fec8ff816c9eb075343d00a5eeae2df375574977ab9b0d71
SHA512cb35c0b5f8c90a1a3e9369078f37e7e199021ebc57d5c059b986f7495f48b4b78ab4d78ef7114cf6be1ce6ab7cde49ab929c4c8513ea475f6ec64d8934bb0123
-
Filesize
451B
MD5d364be2ce0e241a028d7417486ab4ded
SHA1658430b4fe71bf63007a4af9722a396adf4ed67a
SHA256e596a84d0a8719bbe6eca4e59cb7a6f16c64f1bb6500edf5405ba857c3e6a5dc
SHA5120f10f84850db38e8df6d77df0ebaeacf79a1fa00d84783a9eee40eda99e29d33e453d477427cd504f200a30043b1c5e56415e5d41d9145d90fce4b45be2d843d
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
583KB
MD5f40641f6724a17eb3cc8bb4404caa6b4
SHA1bd78862c8dbe4d583ba618e5fa1d2812f50726e5
SHA256b9070989900ce4b0f2d4e1ef2ec4708355ae3736296d10843666b4285c308f8e
SHA512ad3d90f523a7334e37932a3543390ccde9bacc9f628138a524426f91c118d8dcc9a69219886c4b8987046d465686acdbd3fc8dff12f9b1cdf6171aa295515440
-
Filesize
872KB
MD52fca4116a24e435da278eba9b4d141d6
SHA19c6c076c2dd023c8709bd398d9d19b6f6f9ebc30
SHA2567ea5b7a7fe7d29efce69bd4d5cc704ce48d5316f9ccc7678755f92b327a8ddc0
SHA512d751f80e42bce965940df55042348342ef35811b409d67be7691386c5cdbc5c0fa85ac6a193261277362e07f4004c92869d86947f803beecdec56a9e5c65e315
-
Filesize
990KB
MD530756a814cb126d3aaade64144a787c5
SHA1c01865957f301263bc01ffe08fbdb4af2a3df7b1
SHA2564278eecfba9f76966fa4673ab5cf9d7470984fdb21b00dfa8256199e39eb8262
SHA51293ef957a21a67e46e334e8a4e8f1b2b55ea7d6fcf51e475db6bf18f8b3f7642b8f896f23adbe5061c5641d041aff14d447ed7ac7f2cf8104f8ad094f7c8cfe20
-
Filesize
28KB
MD53a3b9a5e00ef6a3f83bf300e2b6b67bb
SHA1261127183df2987de2239806dd74fe624c430608
SHA25687b036c720fbd5e63355b9920a2864feaf59b1584ebd8458651936ab8c7c1f81
SHA51221df8867246a9c5834253c0d2c2de3e620e9f8b4b031b9e53cb6082eca78b90bdb09b9e8baf39e05a08b859f81b3aecbc34f3540428cef0bed746d7e769f2f04