Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 01:53
Behavioral task
behavioral1
Sample
C_RAAS.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
C_RAAS.exe
Resource
win10v2004-20240508-en
General
-
Target
C_RAAS.exe
-
Size
2.6MB
-
MD5
2e7d68cbc3752a9b475b76d964c11a03
-
SHA1
20dc966993d469c3ba30a9731952ad90cae42927
-
SHA256
39096e9a521ea1c001083d8c82317c8e6dbdd5d705d9a92beb15db102fb87263
-
SHA512
900178639ff60d82a96fb8995b596ffeb55b8199eb0be5d7e16a236a4864cf1564fb4204a59264de3a2e36e343195604cb23738a45067d4c037596dde1042d89
-
SSDEEP
49152:Uhl/s9YKOEKuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9u:mVsGKJzsG1tQRjdih8rwc
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2028-1-0x00000000011F0000-0x000000000148A000-memory.dmp family_zgrat_v1 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2028-1-0x00000000011F0000-0x000000000148A000-memory.dmp net_reactor -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\16vnjzCdbBmLbWCF.exe C_RAAS.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\16vnjzCdbBmLbWCF.exe C_RAAS.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.CashRansomware C_RAAS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 api.ipify.org 8 api.ipify.org 9 icanhazip.com 11 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Cash.img" C_RAAS.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\MSTTSLoc.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsrom.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IPSEventLogMsg.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\IpsMigrationPlugin.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\msinfo32.exe.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(inch).wmf.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\msdasqlr.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\imjplm.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwjpn.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\numbase.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeush.dat.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrb.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\ado\msador15.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcfr.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InputPersonalization.exe.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\InkObj.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipschs.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mraut.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\ado\msado27.tlb.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkDiv.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPWMI.DLL.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwresplm.dat.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptb.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\msdia90.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msaddsr.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\IPSEventLogMsg.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\MSTTSCommon.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\MSTTSLoc.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msdaprsr.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\tipresx.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqloledb.rll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\tipresx.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed.xrm-ms.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\VISFILT.DLL.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipRes.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\rtscom.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\mip.exe.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tabskb.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\sqloledb.rll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\rtscom.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\IPSEventLogMsg.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrfrash.dat.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InkObj.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipTsf.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msdaremr.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\micaut.dll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\VSTOLoaderUI.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcs.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdaps.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadds.dll.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwritash.dat.CashRansomware C_RAAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InputPersonalization.exe.mui.CashRansomware C_RAAS.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2028 C_RAAS.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD55c412eaaa995acf67959d864090b6862
SHA15fcbe45112dd401ac857e902093fc3cfafc0daab
SHA256fde3b77b960b729e0b2a44e3b9e6bfc4c708c9a5c895da650256c631d77dbec9
SHA5124fc184eed09650d771c00774dd57233d0c60fc5d8e90c24de1521ed687a867b175706cb205866f52619371241255e30688cc2669464dc07d884cee37f132d853
-
Filesize
8KB
MD5bfb33fed3d32f6a6f1d41731eb1b7da9
SHA1dc35694fe496da827a78c2fb7f6a25c94b5b941f
SHA2563abd94ea203e84b4e00d07eaae1a7079e78275cec2e608d964dbc464ba8afc97
SHA512e4da2cc343eeb519250ab1399898253a6290d90ee0130ce5ebf3a288176ed7a3480aa90ba4f3a1aee09bb12d0d1e65bfb611ceaccf9d9965f0baeced3e6848df
-
Filesize
80B
MD5213a720208e39531f9adfe2f547f93bd
SHA1993267df454c3fa51d1ed2c1df54dd95c234fbec
SHA256d09683a79f611ce894de68c5f4ebe33cdea2c2dc147977ec2d40a23cd4287579
SHA512ed9710bc3613062c91f7ca37c200e80f9450ede1eca7f6b982b61b44fb8821400a1f5e26113a95407a5c4088a7d36663c713eece2587c09e22d8ae5990688710
-
Filesize
28KB
MD5dd248ea46931d98abc27a5bd9d249cee
SHA1d92859135420799afb4b3a06d7ddf25aa341bd1f
SHA256f51cccc0c914f35cf72707eb67ef9c8a0a39b39abc8c1a19806088e999dff34c
SHA51225911ba098ae7567cfef2988ef42dd310fdd3260edaee8b1f4163e8242e0dd8e5d99244bacfe71858352dd74696e3ba691f0986bea19f33172b592de5672c310
-
Filesize
16B
MD53389b53fe5f0e87ead56e0184897ee5e
SHA1f5567eba83e5e894dd1226ba1b157efca90b96d2
SHA25638f77a27106520ffa17fd3b16e3f0bcde43146b1d618ae0d554161798709ac17
SHA512a5f06b4e5f431d850cfbe9cc8db8f59e17ad3bf4db188940f074fd58bd6847dcd8da89f0de8383ffcebbfe468563ac6a46a9548e482f63352db340874a4b0def
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xkoyglns.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.CashRansomware
Filesize48KB
MD51fd616ce9f819f4380642312f68fd920
SHA1a4144e00b6cac7c9add1d3915a3acead73473e62
SHA256a873ffb3a2150584f97afc1edd27f895c0aee8bca9e83fdeedc9469770e47852
SHA5129514cabec9b4413f10cbbe69c4f60ed2c506f092a82bb047846cecbd184b3307619c8e2c42d03a2d66fa307ca7bcb1435d468d61b542686ee7a95c29c7765363