Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 15:11

General

  • Target

    ce5db864def993f4fe16fefbf4642960.exe

  • Size

    593KB

  • MD5

    ce5db864def993f4fe16fefbf4642960

  • SHA1

    ffa9293cc75e92aefd32e9777ce7a3b8c3767b24

  • SHA256

    37c431260c2befe3b3042868e871ad8655f391c368422ed9196f2dff95b2c7be

  • SHA512

    2bfbf63fd16e1edf66a686dada7fb63e62d7aa060c54745f9069483df040fea748fba2a793e733ec141a371b85332e3f18e794278e7da49616b40c174f893850

  • SSDEEP

    12288:VWdBniBVJdDe/i2BLmSdmvCkTcCQWLT2NGjm:0ibx2BLUCkICrtj

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce5db864def993f4fe16fefbf4642960.exe
    "C:\Users\Admin\AppData\Local\Temp\ce5db864def993f4fe16fefbf4642960.exe"
    1⤵
    • Modifies system certificate store
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2068-2-0x0000000000300000-0x0000000000393000-memory.dmp

    Filesize

    588KB

  • memory/2068-1-0x0000000003310000-0x0000000003410000-memory.dmp

    Filesize

    1024KB

  • memory/2068-3-0x0000000000400000-0x0000000003290000-memory.dmp

    Filesize

    46.6MB

  • memory/2068-7-0x0000000000300000-0x0000000000393000-memory.dmp

    Filesize

    588KB

  • memory/2068-6-0x0000000003310000-0x0000000003410000-memory.dmp

    Filesize

    1024KB