Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 04:13

General

  • Target

    d28cf934dc0a0dde9706adb80751aa4a.exe

  • Size

    14.9MB

  • MD5

    d28cf934dc0a0dde9706adb80751aa4a

  • SHA1

    a852eb442d14693f041b79c60954a1f7ad00e7ef

  • SHA256

    f7371c0270d7a31f0d5c4565fd826d99bdfd6aaa6fd8497e2f116d863bb97f5f

  • SHA512

    491ad2d09cc05a1f1cef4f244e2f712d6c3243c9c76b36914495393699f5cc76cf266b47cd1defcab3979714abbf3e200f986e82848eb339a0cd228a8b8430f7

  • SSDEEP

    393216:ZuH0zm9VjnWgHCEQ3PJCqaoTVeahmlPYqkVQQ:m0zOVTWgHpqa+hmlwqk

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 8 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d28cf934dc0a0dde9706adb80751aa4a.exe
    "C:\Users\Admin\AppData\Local\Temp\d28cf934dc0a0dde9706adb80751aa4a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\ProgramData\By Click Downloader 2.3.7.Svc_Dsqce.exe
      "C:\ProgramData\By Click Downloader 2.3.7.Svc_Dsqce.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2204
    • C:\ProgramData\By Click Downloader 2.3.7_jenAp.exe
      "C:\ProgramData\By Click Downloader 2.3.7_jenAp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4144
      • C:\Users\Admin\AppData\Local\Temp\is-N92FS.tmp\By Click Downloader 2.3.7_jenAp.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-N92FS.tmp\By Click Downloader 2.3.7_jenAp.tmp" /SL5="$A011C,12495367,64512,C:\ProgramData\By Click Downloader 2.3.7_jenAp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2124
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3788 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3356

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\By Click Downloader 2.3.7_jenAp.exe

      Filesize

      1024KB

      MD5

      d2071734b5f9ada182a9b566741a6025

      SHA1

      ac056e801071854e048c4a02026db09cc71f6f2d

      SHA256

      941a633039b0b6850ae03b7984c99c4b2f82d238d19d3e8d562aa598f35c3929

      SHA512

      cb0f4fd92c6e73a201863aa9954f3cae776bb334ac2d3bc77d3a586880d659895cde6918ac64f8484c94f14613e74cdabdb4be7c9f9367f6af51b662c80e6abf

    • C:\ProgramData\By Click Downloader 2.3.7_jenAp.exe

      Filesize

      1.7MB

      MD5

      2e79741fda506beba9f15ba016cbe2de

      SHA1

      23bea330cd55127ac46991cdcecea414b426751a

      SHA256

      1b8f26affadbcf81ca1616b69029cf4a4df8c269e1424a301bcc53b916b89690

      SHA512

      5e953655264a1d3890770dad46b52810ec4e7a375921197fded82e9f08cffb56254191cf5a2a320c213df3e6b7641efa65f7d4c697f852673f5c661546dcae2b

    • C:\ProgramData\By Click Downloader 2.3.7_jenAp.exe

      Filesize

      1.9MB

      MD5

      1b67e9aca8a2281fc52f81adfff617ad

      SHA1

      0cbbfd3d757d5722dd8eefacc484107e59fd8ccc

      SHA256

      68a56146bc93dc5dfedf9a0779315c7359b7f3b1e9940d74943c1e9486d31234

      SHA512

      0d4882e9cdc1a61ad38c7ba39b474a36a75ae3590d37a8484f6bbe5d23c9aa9c2e4260ebeab1a609e10d3f3d91cae4e11261c60f88b5193742cb0f656f3cb17f

    • C:\Users\Admin\AppData\Local\Temp\aut942.tmp

      Filesize

      1.9MB

      MD5

      5cc3cfdc0101f962f06aa49201ffb075

      SHA1

      d412e9d6c1e226df6c39ac2b34bb0202e3434000

      SHA256

      0b7e699db97f3846dd9894a5ba80643298db8fb9300e3691e05b219df29a9162

      SHA512

      044db5c759d570a9ac041f4079219cb12267ce1d0684e22e6e9ee0d4ba07c28d79c1140a4bf9c65d2f01452113a107bee21f06b43b2c8f0689a3895335b7b94e

    • C:\Users\Admin\AppData\Local\Temp\is-N92FS.tmp\By Click Downloader 2.3.7_jenAp.tmp

      Filesize

      502KB

      MD5

      466a61c805928a3d93269c95d4b14276

      SHA1

      a27bc73a2820677fbebe1f03acef4e9baa2a006d

      SHA256

      16364f930e74da4a644ba584b72f197392dd821c18361fdde9089b961c11c13c

      SHA512

      373d7f3cec83c34840c3378d2b0cf9ff421d3a82886c3b0cbdd3439b1a9c4d0d0377d6ab0deea74bf25e31ddfcc9da73914d491ee122de37eca275955cebcf32

    • C:\Users\Admin\AppData\Local\Temp\is-N92FS.tmp\By Click Downloader 2.3.7_jenAp.tmp

      Filesize

      265KB

      MD5

      ecdc74fba112e2410378c9ab4a8cc5d0

      SHA1

      7e015f5d7b10ca112b54610b931aa3ab23a5dbf4

      SHA256

      a927aed94f96b726605ba8594e6449d1d724396e1919d15df85b1a270bbb11bb

      SHA512

      9763308adfd5114245eaa0bcebd3f69c34bc088813aaa931f5ef1d5e4f24f3ac12cf65979cfa30c6a12f021a602a6c2619ed1a38d01251d905cf5e47ce3c48e2

    • C:\Users\Admin\AppData\Local\Temp\is-SRT1G.tmp\ISTask.dll

      Filesize

      66KB

      MD5

      86a1311d51c00b278cb7f27796ea442e

      SHA1

      ac08ac9d08f8f5380e2a9a65f4117862aa861a19

      SHA256

      e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d

      SHA512

      129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec

    • C:\Users\Admin\AppData\Local\Temp\is-SRT1G.tmp\VclStylesInno.dll

      Filesize

      1015KB

      MD5

      7d49abf45a3a03090ebfcc55eda2976a

      SHA1

      b10f076048b1255aab7d0a29fb02cd20b4f0e9d6

      SHA256

      39c6cd9b7e37df3b79700835937e3349d6a107c879a469c18a14fdc0ecd13672

      SHA512

      d153d99d6f3d5030f4ac9c6e66ee437645e2cef65071225714b03b8b7ea4bd63be7e5fde76764d3b433738dc566309e5b57639cbdb4dd4ba3c4230b353edfa3e

    • C:\Users\Admin\AppData\Local\Temp\is-SRT1G.tmp\VclStylesInno.dll

      Filesize

      1.2MB

      MD5

      7384fdafb1f06bdc95d01c53cfbc52a6

      SHA1

      90cb6b43236ea54835a8b37cac6b9c9d77e54cf2

      SHA256

      a25411ab849e6f83fe3966d31454c5afa8cd8e101ec3facddaa5e55dc6f3bbbf

      SHA512

      b3c104d28e83e650ff42a1a110d2e5555ab224daae7996b95f7a8dc7e48bfbf60ef007bc25ad7abda3f34fe1b742376a1d04d7bd7b14734413d8225ac64dc9d9

    • memory/2124-86-0x00000000079A0000-0x00000000079A1000-memory.dmp

      Filesize

      4KB

    • memory/2124-102-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-151-0x00000000073D0000-0x00000000073D1000-memory.dmp

      Filesize

      4KB

    • memory/2124-149-0x0000000002260000-0x0000000002261000-memory.dmp

      Filesize

      4KB

    • memory/2124-134-0x00000000073D0000-0x00000000073D1000-memory.dmp

      Filesize

      4KB

    • memory/2124-120-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-122-0x0000000007A60000-0x0000000007A61000-memory.dmp

      Filesize

      4KB

    • memory/2124-121-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-53-0x0000000002260000-0x0000000002261000-memory.dmp

      Filesize

      4KB

    • memory/2124-61-0x00000000072B0000-0x00000000072C6000-memory.dmp

      Filesize

      88KB

    • memory/2124-118-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-119-0x0000000007A50000-0x0000000007A51000-memory.dmp

      Filesize

      4KB

    • memory/2124-117-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-68-0x00000000074E0000-0x00000000077FA000-memory.dmp

      Filesize

      3.1MB

    • memory/2124-71-0x0000000007950000-0x0000000007951000-memory.dmp

      Filesize

      4KB

    • memory/2124-72-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-73-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-74-0x0000000007960000-0x0000000007961000-memory.dmp

      Filesize

      4KB

    • memory/2124-75-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-76-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-77-0x0000000007970000-0x0000000007971000-memory.dmp

      Filesize

      4KB

    • memory/2124-78-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-79-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-80-0x0000000007980000-0x0000000007981000-memory.dmp

      Filesize

      4KB

    • memory/2124-81-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-82-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-83-0x0000000007990000-0x0000000007991000-memory.dmp

      Filesize

      4KB

    • memory/2124-84-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-85-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-87-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-88-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-116-0x0000000007A40000-0x0000000007A41000-memory.dmp

      Filesize

      4KB

    • memory/2124-93-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-90-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-115-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-89-0x00000000079B0000-0x00000000079B1000-memory.dmp

      Filesize

      4KB

    • memory/2124-92-0x00000000079C0000-0x00000000079C1000-memory.dmp

      Filesize

      4KB

    • memory/2124-94-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-96-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-97-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-95-0x00000000079D0000-0x00000000079D1000-memory.dmp

      Filesize

      4KB

    • memory/2124-98-0x00000000079E0000-0x00000000079E1000-memory.dmp

      Filesize

      4KB

    • memory/2124-99-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-100-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-101-0x00000000079F0000-0x00000000079F1000-memory.dmp

      Filesize

      4KB

    • memory/2124-103-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-105-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-106-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-104-0x0000000007A00000-0x0000000007A01000-memory.dmp

      Filesize

      4KB

    • memory/2124-91-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-107-0x0000000007A10000-0x0000000007A11000-memory.dmp

      Filesize

      4KB

    • memory/2124-109-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-108-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-110-0x0000000007A20000-0x0000000007A21000-memory.dmp

      Filesize

      4KB

    • memory/2124-111-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-112-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-113-0x0000000007A30000-0x0000000007A31000-memory.dmp

      Filesize

      4KB

    • memory/2124-114-0x0000000007800000-0x0000000007940000-memory.dmp

      Filesize

      1.2MB

    • memory/2204-42-0x0000000000DB0000-0x0000000001308000-memory.dmp

      Filesize

      5.3MB

    • memory/2204-17-0x0000000000DB0000-0x0000000001308000-memory.dmp

      Filesize

      5.3MB

    • memory/2204-18-0x0000000077A44000-0x0000000077A46000-memory.dmp

      Filesize

      8KB

    • memory/2204-27-0x0000000000DB0000-0x0000000001308000-memory.dmp

      Filesize

      5.3MB

    • memory/2204-28-0x0000000000DB0000-0x0000000001308000-memory.dmp

      Filesize

      5.3MB

    • memory/2204-46-0x0000000000DB0000-0x0000000001308000-memory.dmp

      Filesize

      5.3MB

    • memory/2204-29-0x0000000000DB0000-0x0000000001308000-memory.dmp

      Filesize

      5.3MB

    • memory/2204-39-0x0000000000DB0000-0x0000000001308000-memory.dmp

      Filesize

      5.3MB

    • memory/2204-44-0x0000000000DB0000-0x0000000001308000-memory.dmp

      Filesize

      5.3MB

    • memory/2204-146-0x0000000000DB0000-0x0000000001308000-memory.dmp

      Filesize

      5.3MB

    • memory/2204-38-0x0000000000DB0000-0x0000000001308000-memory.dmp

      Filesize

      5.3MB

    • memory/4144-147-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/4144-41-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB