Analysis
-
max time kernel
12s -
max time network
12s -
platform
windows11-21h2_x64 -
resource
win11-20240319-en -
resource tags
arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-04-2024 05:19
Static task
static1
1 signatures
General
-
Target
build.exe
-
Size
3.1MB
-
MD5
7added706284b583067cce950419e560
-
SHA1
23b854a47420bbe6ad19616eb594edd0cd65a734
-
SHA256
c9c31aa87520742c070852f2197d41847df2906c3b63b94547af837140ba88ed
-
SHA512
336a7a1d6d8b0012bc7bf7ae38dca6656319bb1332cf9bd561705841945aa22ac69be6889ea8af4755b1bb94568005ecc88465826470b609690b5ced1f7a0ac5
-
SSDEEP
98304:UbPR0leq5gXtFxlH56Y+PdBN0rAf3sKDWMLmV0DC+:ER0lelD4BtmV0Dp
Malware Config
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
resource yara_rule behavioral1/memory/1192-12-0x0000000003BB0000-0x0000000003BC6000-memory.dmp family_raccoon_v2 -
Program crash 1 IoCs
pid pid_target Process procid_target 4836 1192 WerFault.exe 76 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1192 build.exe 1192 build.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2844 Taskmgr.exe Token: SeSystemProfilePrivilege 2844 Taskmgr.exe Token: SeCreateGlobalPrivilege 2844 Taskmgr.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe 2844 Taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 5522⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1192 -ip 11921⤵PID:3788
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2844