Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/03/2024, 03:11

General

  • Target

    cfc6452cdc5ead4a1e8ad4f6e1a87e4f.exe

  • Size

    5.3MB

  • MD5

    cfc6452cdc5ead4a1e8ad4f6e1a87e4f

  • SHA1

    72b86af71e4e5e9df3a350e3813a75e303bd1b16

  • SHA256

    ee2b2b713a6300e185074b3e7ebacbe04e993cd20ea6ffbb4b065d35aa375153

  • SHA512

    09bccce94c5a51f3b85e3bd2a8e023ec7cab26d161343854920105931ea7c1aa9c13184a65d2e32fbf42ad99796281c46903a2f65f48824baaf86dd32ac7e887

  • SSDEEP

    98304:PEBJXQsW/kFGAgz3Qq9V8Rtj6TkAY7wZWYfTJUULBJSvAiWbESPjNsWxW/exAYoY:8VFGXQzr8vXfTJU6SvAiWbtPP87PWUaL

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfc6452cdc5ead4a1e8ad4f6e1a87e4f.exe
    "C:\Users\Admin\AppData\Local\Temp\cfc6452cdc5ead4a1e8ad4f6e1a87e4f.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2088-3-0x0000000000400000-0x0000000000CB8000-memory.dmp

    Filesize

    8.7MB

  • memory/2088-4-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2088-1-0x0000000000400000-0x0000000000CB8000-memory.dmp

    Filesize

    8.7MB

  • memory/2088-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2088-6-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2088-7-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2088-9-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2088-11-0x0000000077270000-0x0000000077271000-memory.dmp

    Filesize

    4KB

  • memory/2088-12-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2088-16-0x0000000000400000-0x0000000000CB8000-memory.dmp

    Filesize

    8.7MB