Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 12:42
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
1.6MB
-
MD5
2a7ba8c1f169b12753cf920b28a7db0e
-
SHA1
6a9b2f1e100bc6b31621951a293be4fd59b79937
-
SHA256
acae26cfe00f442507c384c69eb5a85326754c214795becd65ad4e798e881a83
-
SHA512
844abb5930b93f03bcd63b5e19b05a21b7f61600e7321ce259d1f99dc42c16cd3d34c3519f582f61b3a93bedb662ac1363497aac9d5d18c956caa01090c4ca64
-
SSDEEP
49152:gEnRaINP03sRG/CQx0u+m9BcR1EZfuuW:gSa4P088xGYczrz
Malware Config
Extracted
raccoon
2ca5558c9ec8037d24a611513d7bd076
https://192.153.57.177:80
-
user_agent
MrBidenNeverKnow
Signatures
-
Raccoon Stealer V2 payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2388-11-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral1/memory/2388-9-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral1/memory/2388-13-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral1/memory/2388-14-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 2104 set thread context of 2388 2104 file.exe MSBuild.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file.exeMSBuild.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
file.exedescription pid process target process PID 2104 wrote to memory of 2388 2104 file.exe MSBuild.exe PID 2104 wrote to memory of 2388 2104 file.exe MSBuild.exe PID 2104 wrote to memory of 2388 2104 file.exe MSBuild.exe PID 2104 wrote to memory of 2388 2104 file.exe MSBuild.exe PID 2104 wrote to memory of 2388 2104 file.exe MSBuild.exe PID 2104 wrote to memory of 2388 2104 file.exe MSBuild.exe PID 2104 wrote to memory of 2388 2104 file.exe MSBuild.exe PID 2104 wrote to memory of 2388 2104 file.exe MSBuild.exe PID 2104 wrote to memory of 2388 2104 file.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2388
-