Analysis
-
max time kernel
27s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
raccoon-4.24.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
raccoon-4.24.0.exe
Resource
win10v2004-20240508-en
General
-
Target
raccoon-4.24.0.exe
-
Size
13.2MB
-
MD5
0422527c1f0de1419f2b0bc08b511eb0
-
SHA1
df781bb811b268b75950974e77fa9cdb837247b6
-
SHA256
f616db7cc3228879ff676d9c4d63955f0a1e7477191c08b0ef3ce5b601801d7c
-
SHA512
db3b2369e76bead40f18a51c9ee26651c120703278aea9fb9b24e6399ba6d45b7d666ec26c891adb4ae1ef0f677c0a3af91b5ba3571233aec7e2c793160a7313
-
SSDEEP
196608:SQiK0+/B+NCqVPZtQvDVY0ULU+qdnomW34fbcJ24++B+gn5Kcrpl/:Sr+/B+YbVY0UQznbW34fbcJn+gn5vNJ
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3604 icacls.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ javaw.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ javaw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1296 javaw.exe 1296 javaw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 452 wrote to memory of 1296 452 raccoon-4.24.0.exe 89 PID 452 wrote to memory of 1296 452 raccoon-4.24.0.exe 89 PID 1296 wrote to memory of 3604 1296 javaw.exe 90 PID 1296 wrote to memory of 3604 1296 javaw.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\raccoon-4.24.0.exe"C:\Users\Admin\AppData\Local\Temp\raccoon-4.24.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Dswing.defaultlaf=com.sun.java.swing.plaf.windows.WindowsLookAndFeel -Djava.net.preferIPv4Stack=true -classpath "C:\Users\Admin\AppData\Local\Temp\raccoon-4.24.0.exe;lib\Raccoon-desktop-4.24.0.jar" de.onyxbits.raccoon.Main2⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3604
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1032,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=3812 /prefetch:81⤵PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD56df1554615d31284a01986b7d15bb767
SHA11caf77654c936ad75f579488be867eb7c09d9f22
SHA256de86858213b98b3f61c3d314bfa5f63bb5766d50d085a7591d224d2e7e1e196e
SHA512029f7386564156f05690b529d82ae34deb3415796867b7bf2f7a71ebd7058812ce455a39b87266beae6e058d788036d891205e00062f962b88f995bd55450231