Analysis

  • max time kernel
    296s
  • max time network
    295s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-07-2024 22:38

General

  • Target

    70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe

  • Size

    2.9MB

  • MD5

    80958a4b85453f4df82ec131554a5412

  • SHA1

    44cefe96467895934ec9d1c2461036704c971458

  • SHA256

    70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783

  • SHA512

    cab01e1d63b4ff9a8d35c48fddd18b0959068510b1ca0e66997ed2d59a34b8903f23d3b3736180b52130a325eda3665f9babe2dcad91308f16526e8812fee1c8

  • SSDEEP

    49152:jF50a6aPVOFMx3SmroCZscivbS6mqxEWoKmqZJffp3vSsqPU4eaw1GfNOmdxPXFZ:XroA7PBfDt1yOcqtd

Malware Config

Extracted

Family

raccoon

Botnet

1a5d06870a6b84740b2c11dce573e9a0

C2

http://95.169.205.186:80/

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V2 payload 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe
    "C:\Users\Admin\AppData\Local\Temp\70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2604
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:360
      • C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe
        "C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4104
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
          4⤵
            PID:4748
        • C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe
          "C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1388
          • C:\ProgramData\91ewsf817t.exe
            "C:\ProgramData\91ewsf817t.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4204
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u RVN:RMQDxW1vrTGfBtFjnev9niyb1UPuz5JX2A.RIG_CPU -p x --cpu-max-threads-hint=50
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              PID:944
        • C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe
          "C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1392
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
            4⤵
              PID:1100
          • C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe
            "C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4608
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
              4⤵
                PID:3028
            • C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe
              "C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:972
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
                4⤵
                  PID:2184
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
                  4⤵
                    PID:1960
                • C:\ProgramData\SmLAztxc1o8yfogkJXrRjbDt.exe
                  "C:\ProgramData\SmLAztxc1o8yfogkJXrRjbDt.exe"
                  3⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1596
                  • C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:852

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe

              Filesize

              1.0MB

              MD5

              18b80be4ccf569476db98955ad019621

              SHA1

              2c160dc5cd238d9d7f0ca4b4a6419eacb4d6a76b

              SHA256

              df4be4cd1353fcc4da27d21950f9080647884f8985cac8a5c54cc8f5fd2a843c

              SHA512

              59565a2a19b8530dd15ac855d361ff7da9e534511787ee296f2e33aad87ebd3141b6e3e0bdd10a34482c0f60bfd644dc5ac11913650998ad6ab84c8f5b2a179f

            • C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe

              Filesize

              1.1MB

              MD5

              2053217d23f13b47a2801d33e767b72f

              SHA1

              cb40b186c36a272ab43d57e8c65b1aefc8d5d439

              SHA256

              dbaa899681f00b7d5852a0273afedc5e8fc6a81296a82d12c2fd8c6893461c85

              SHA512

              98327755c07d5a0fbff900e0d51c1602a88ee0b8cb4163fe40a793a4833c2df8ecade1583045585ea9ee4a17a870e354dd91038fb0d16f7c2cf64ef23c036b4f

            • C:\ProgramData\SmLAztxc1o8yfogkJXrRjbDt.exe

              Filesize

              1.4MB

              MD5

              fe3f1a17359c69cbdd0572a86e7f1f04

              SHA1

              f81d2d798a8b92d8313d60d1536fa6b59b0634d2

              SHA256

              28681dc720f47253cdc952621192d3753c8daf5a2c01803c4ab1560f449d500a

              SHA512

              d26db6aecc04a1c43cfb97cb96f570d309b7b678453df449be7b97836beb5167ca57463f6a7de2e489ee5e3dbccb10f986247d620e2c434b5d212da01981901e

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4nfw20hv.4g4.ps1

              Filesize

              1B

              MD5

              c4ca4238a0b923820dcc509a6f75849b

              SHA1

              356a192b7913b04c54574d18c28d46e6395428ab

              SHA256

              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

              SHA512

              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

            • memory/360-48-0x0000000000400000-0x00000000004D6000-memory.dmp

              Filesize

              856KB

            • memory/360-127-0x0000000000400000-0x00000000004D6000-memory.dmp

              Filesize

              856KB

            • memory/360-45-0x0000000000400000-0x00000000004D6000-memory.dmp

              Filesize

              856KB

            • memory/360-46-0x0000000000400000-0x00000000004D6000-memory.dmp

              Filesize

              856KB

            • memory/360-47-0x0000000000400000-0x00000000004D6000-memory.dmp

              Filesize

              856KB

            • memory/972-126-0x00007FF69CDD0000-0x00007FF69D0A0000-memory.dmp

              Filesize

              2.8MB

            • memory/972-93-0x00007FF69CDD0000-0x00007FF69D0A0000-memory.dmp

              Filesize

              2.8MB

            • memory/1392-78-0x00007FF64A160000-0x00007FF64A430000-memory.dmp

              Filesize

              2.8MB

            • memory/1392-114-0x00007FF64A160000-0x00007FF64A430000-memory.dmp

              Filesize

              2.8MB

            • memory/1596-103-0x0000000000A20000-0x0000000000B82000-memory.dmp

              Filesize

              1.4MB

            • memory/2604-39-0x00007FFB35280000-0x00007FFB35C6C000-memory.dmp

              Filesize

              9.9MB

            • memory/2604-9-0x00007FFB35280000-0x00007FFB35C6C000-memory.dmp

              Filesize

              9.9MB

            • memory/2604-5-0x00000200B7230000-0x00000200B7252000-memory.dmp

              Filesize

              136KB

            • memory/2604-18-0x00007FFB35280000-0x00007FFB35C6C000-memory.dmp

              Filesize

              9.9MB

            • memory/2604-2-0x00007FFB35283000-0x00007FFB35284000-memory.dmp

              Filesize

              4KB

            • memory/2604-54-0x00007FFB35280000-0x00007FFB35C6C000-memory.dmp

              Filesize

              9.9MB

            • memory/2604-8-0x00000200B73E0000-0x00000200B7456000-memory.dmp

              Filesize

              472KB

            • memory/4104-67-0x00007FF7F1BC0000-0x00007FF7F1E90000-memory.dmp

              Filesize

              2.8MB

            • memory/4104-88-0x00007FF7F1BC0000-0x00007FF7F1E90000-memory.dmp

              Filesize

              2.8MB

            • memory/4204-149-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-155-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-4131-0x000001A9E0AF0000-0x000001A9E0B3C000-memory.dmp

              Filesize

              304KB

            • memory/4204-4130-0x000001A9C8540000-0x000001A9C8596000-memory.dmp

              Filesize

              344KB

            • memory/4204-134-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-132-0x000001A9E0A40000-0x000001A9E0AEA000-memory.dmp

              Filesize

              680KB

            • memory/4204-133-0x000001A9E0B70000-0x000001A9E0C78000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-151-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-157-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-171-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-169-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-167-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-165-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-163-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-161-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-135-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-153-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-159-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-147-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-145-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-143-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-141-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-140-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-137-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-173-0x000001A9E0B70000-0x000001A9E0C75000-memory.dmp

              Filesize

              1.0MB

            • memory/4608-84-0x00007FF6A4B80000-0x00007FF6A4E50000-memory.dmp

              Filesize

              2.8MB

            • memory/4608-120-0x00007FF6A4B80000-0x00007FF6A4E50000-memory.dmp

              Filesize

              2.8MB

            • memory/4748-96-0x0000000000400000-0x0000000000416000-memory.dmp

              Filesize

              88KB

            • memory/4748-86-0x0000000000400000-0x0000000000416000-memory.dmp

              Filesize

              88KB

            • memory/4748-94-0x0000000000400000-0x0000000000416000-memory.dmp

              Filesize

              88KB