Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/03/2024, 14:07

General

  • Target

    d110032f570a2c3945fb844948fc1184.exe

  • Size

    526KB

  • MD5

    d110032f570a2c3945fb844948fc1184

  • SHA1

    0e15ba5e6db53b261ae380dc8f5937b5ff066ebd

  • SHA256

    71875b2f1fdbd32fcd8c8db55e437e150d7bfaba30c435d71cdcfdb31331080b

  • SHA512

    3290b5364b69e7068e46ebac45f6b73c7522ec8cc0849212a672f7e180cdc2087000af8d704d020316f25de33b8159edb7c5229264ec13ec0d5e36b17720f856

  • SSDEEP

    12288:oJFNLH1JZEvU8m68AT2oq7mGyxYKtNm9fCt/Y:IH1JI8I2oKyxYKft/

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d110032f570a2c3945fb844948fc1184.exe
    "C:\Users\Admin\AppData\Local\Temp\d110032f570a2c3945fb844948fc1184.exe"
    1⤵
    • Modifies system certificate store
    PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2004-2-0x0000000000310000-0x000000000039F000-memory.dmp

    Filesize

    572KB

  • memory/2004-1-0x00000000024D0000-0x00000000025D0000-memory.dmp

    Filesize

    1024KB

  • memory/2004-3-0x0000000000400000-0x00000000023EE000-memory.dmp

    Filesize

    31.9MB

  • memory/2004-5-0x00000000024D0000-0x00000000025D0000-memory.dmp

    Filesize

    1024KB