Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2024, 08:50

General

  • Target

    d316fe23edde074b378824dde37007a9.exe

  • Size

    526KB

  • MD5

    d316fe23edde074b378824dde37007a9

  • SHA1

    8e5512878a6394289d21fdeeacc0a9568c2b1ac2

  • SHA256

    73e096bfd4c6bbfc56d921599ec8daf5b45685eaa89281f77957d83f1dce2172

  • SHA512

    0bb6ad81f601873b7dfeab1410b426edc3f6a893ba26fae88c5f53cfac2978390dd6af9d77523acec2225405dcc193bac3463ee9b8414f93dd971e710a406c81

  • SSDEEP

    12288:8KlJFs+Q50xv/0GonkM9stxlknhDkDt2uBPAi:RjFs+QU/0GIf9OcMBPA

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d316fe23edde074b378824dde37007a9.exe
    "C:\Users\Admin\AppData\Local\Temp\d316fe23edde074b378824dde37007a9.exe"
    1⤵
    • Modifies system certificate store
    PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2884-1-0x0000000000A00000-0x0000000000B00000-memory.dmp

    Filesize

    1024KB

  • memory/2884-2-0x0000000000340000-0x00000000003D3000-memory.dmp

    Filesize

    588KB

  • memory/2884-3-0x0000000000400000-0x00000000008ED000-memory.dmp

    Filesize

    4.9MB

  • memory/2884-5-0x0000000000A00000-0x0000000000B00000-memory.dmp

    Filesize

    1024KB

  • memory/2884-7-0x0000000000340000-0x00000000003D3000-memory.dmp

    Filesize

    588KB