Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
2049ea349d3447edc2dcb38abc52b8c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2049ea349d3447edc2dcb38abc52b8c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
2049ea349d3447edc2dcb38abc52b8c0N.exe
-
Size
339KB
-
MD5
2049ea349d3447edc2dcb38abc52b8c0
-
SHA1
96e1da2cd9d9118acd037414be94b1674c16821f
-
SHA256
105337b8fc4e73342f088682defad087131a6c207d2c06258052c1a80247f9ba
-
SHA512
9ca1ec4393fb8b42dbfeec918a58b3ce2a553ea634677eb3f9c2c4ef121d07d44fb477947ccfc7a2a29c389fd7f5b8ad8566cf066dcf7d5c55d98fbd30654639
-
SSDEEP
6144:J6vmlLvL/ezJnHRljTqUDi93S5dEOPZElnyHSMJY:J6vmlX/oxlHqUDixS5dEOkTMJ
Malware Config
Extracted
raccoon
64b445f2d85b7aeb3d5c7b23112d6ac3
http://45.15.156.209/
-
user_agent
23591
Signatures
-
Raccoon Stealer V2 payload 4 IoCs
resource yara_rule behavioral2/memory/4592-3-0x0000000000400000-0x000000000041E000-memory.dmp family_raccoon_v2 behavioral2/memory/4592-2-0x0000000000700000-0x000000000071C000-memory.dmp family_raccoon_v2 behavioral2/memory/4592-4-0x0000000000400000-0x000000000045B000-memory.dmp family_raccoon_v2 behavioral2/memory/4592-7-0x0000000000400000-0x000000000041E000-memory.dmp family_raccoon_v2 -
Program crash 1 IoCs
pid pid_target Process procid_target 3872 4592 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2049ea349d3447edc2dcb38abc52b8c0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2049ea349d3447edc2dcb38abc52b8c0N.exe"C:\Users\Admin\AppData\Local\Temp\2049ea349d3447edc2dcb38abc52b8c0N.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 12842⤵
- Program crash
PID:3872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4592 -ip 45921⤵PID:1752