Analysis
-
max time kernel
131s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 10:46
Behavioral task
behavioral1
Sample
2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe
-
Size
593KB
-
MD5
f21bae4debf2bc660f2fce8285556790
-
SHA1
6febf83452c9c809a34ac32b77e0927c474c5c89
-
SHA256
4394703b75ca6de35ab20fd34d4669955617f9420c95a1191ee0aa7cc5ca997a
-
SHA512
97427930525dd120d06f8ef10affa391a6b262ef1347a51b4fbf7ce64a570ed4515d8b433117d237a68668ea3e16c3d8cdaca6d8f5bb4475ab1aabd64ff980f3
-
SSDEEP
12288:87AVwypN9NnwDLaDHZoFBHq3Ad4Dqo3XWRsauaabCuJ583f:EkX9JwDLaDHZoFs3ACcRQaaGn3f
Malware Config
Extracted
raccoon
1c0fad6805a0f65d7b597130eb9f089ffbe9857d
-
url4cnc
http://194.180.191.241/capibar
http://103.155.93.35/capibar
https://t.me/capibar
Signatures
-
Raccoon Stealer V1 payload 2 IoCs
resource yara_rule behavioral2/memory/3140-0-0x00000000001A0000-0x0000000000238000-memory.dmp family_raccoon_v1 behavioral2/memory/3140-12-0x00000000001A0000-0x0000000000238000-memory.dmp family_raccoon_v1 -
Detects executables packed with ASPack 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023298-3.dat INDICATOR_EXE_Packed_ASPack behavioral2/memory/1832-5-0x0000000000280000-0x0000000000289000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/1832-10-0x0000000000280000-0x0000000000289000-memory.dmp INDICATOR_EXE_Packed_ASPack -
Detects executables referencing many email and collaboration clients. Observed in information stealers 2 IoCs
resource yara_rule behavioral2/memory/3140-0-0x00000000001A0000-0x0000000000238000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3140-12-0x00000000001A0000-0x0000000000238000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
resource yara_rule behavioral2/files/0x0007000000023298-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation uRl.exe -
Executes dropped EXE 1 IoCs
pid Process 1832 uRl.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe uRl.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe uRl.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe uRl.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe uRl.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe uRl.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe uRl.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe uRl.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteshare.exe uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\SoundRec.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE uRl.exe File opened for modification C:\Program Files\Windows Mail\wab.exe uRl.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe uRl.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe uRl.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe uRl.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\XLICONS.EXE uRl.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe uRl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe uRl.exe File opened for modification C:\Program Files\7-Zip\7z.exe uRl.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe uRl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe uRl.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe uRl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe uRl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3140 wrote to memory of 1832 3140 2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe 83 PID 3140 wrote to memory of 1832 3140 2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe 83 PID 3140 wrote to memory of 1832 3140 2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe 83 PID 1832 wrote to memory of 3044 1832 uRl.exe 90 PID 1832 wrote to memory of 3044 1832 uRl.exe 90 PID 1832 wrote to memory of 3044 1832 uRl.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\uRl.exeC:\Users\Admin\AppData\Local\Temp\uRl.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5e70569d.bat" "3⤵PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD596e4f600a3fa4870b6bb48b2e54c7a65
SHA1904a3201fa4d3d961b4e875f789560b145207553
SHA2568bdf9a2e30eb9c75747bfd362c22886d517de1c0cec78d0b1879980a3ec5075d
SHA51210f9dc35a33d6e408dee9a79d44ec1914cf20ebeaebcb49e051f4ca34680dbbcd1f82ac2ff0523ca49e74e407a409a24e5af91f78dc970c2d7080be434067eef
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e