Analysis
-
max time kernel
133s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 02:46
Behavioral task
behavioral1
Sample
2024-09-06_b50f8bc6baac3734b767edcc2c2edbe0_avoslocker_cobalt-strike_raccoonstealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-06_b50f8bc6baac3734b767edcc2c2edbe0_avoslocker_cobalt-strike_raccoonstealer.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_b50f8bc6baac3734b767edcc2c2edbe0_avoslocker_cobalt-strike_raccoonstealer.exe
-
Size
564KB
-
MD5
b50f8bc6baac3734b767edcc2c2edbe0
-
SHA1
aeee37aca0239f0d3ef694aff4363b10e148308b
-
SHA256
3d9073c7400467eaab13823a63b553bfa6fc47be29f4676ed71c0ae63147c568
-
SHA512
5491219c34b1363032d8b2899dcdc5be12f0f92c6af41d6b8350d63e55a8896dce9ee8567a442398493e284f96ad875dce3e1f53c5998207af7d1ae76480ee7c
-
SSDEEP
12288:38Malpp/QPcqcGVwwAPfoEQB94Uc1VNzZWPx9YBKzTdb:38dhQEqcGQfoxGVxIPAIvd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-09-06_b50f8bc6baac3734b767edcc2c2edbe0_avoslocker_cobalt-strike_raccoonstealer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-06_b50f8bc6baac3734b767edcc2c2edbe0_avoslocker_cobalt-strike_raccoonstealer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-06_b50f8bc6baac3734b767edcc2c2edbe0_avoslocker_cobalt-strike_raccoonstealer.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-06_b50f8bc6baac3734b767edcc2c2edbe0_avoslocker_cobalt-strike_raccoonstealer.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1928