Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe
Resource
win10v2004-20240709-en
General
-
Target
SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe
-
Size
813KB
-
MD5
6a7681530b7cd49a24f0e12f609f0635
-
SHA1
02595be9615b657bbbbfa4f4296a5f905fb6485a
-
SHA256
afd8d8d37d356702122236ca272511a8408ec817c33276122641245b034661f6
-
SHA512
66a3e786f8392fff29f5f6611a89f9b6891da3e12e9fff765d7d1336857c86bdc8674f5f2f70ef73a235a837257ec4bfcf7408d533bbb7a26a9a3ad6c9e1c4f8
-
SSDEEP
12288:IycLHzILbdesTkxgaEfLDRXrIAzhXUj5/PY88KzRrhK7fVIIa4Nd4K6mZvUoy:BcLHiX1akDR7IcXu/Q8rOfVIp32Uo
Malware Config
Extracted
raccoon
071a7b18a42c1cd94de2fc5bb0bbcaf2
http://193.142.147.59:80
-
user_agent
Xmlst
Signatures
-
Raccoon Stealer V2 payload 2 IoCs
resource yara_rule behavioral1/memory/5328-1099-0x0000000000400000-0x0000000000418000-memory.dmp family_raccoon_v2 behavioral1/memory/5328-1100-0x0000000000400000-0x0000000000418000-memory.dmp family_raccoon_v2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30 PID 2568 wrote to memory of 5328 2568 SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.2334.3801.19434.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵PID:5328
-