Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
1.6MB
-
MD5
1bff2e1095c5000b950c2f9bcde896e5
-
SHA1
fc61d68aa844f8a3cf8e879ea0005c009560b306
-
SHA256
ca21d368d1f29efc9be3158e0bacbe66640dba8ed3cdf9ba9f6a485a2664cf05
-
SHA512
6339f59483fb86b402392171fc11ddaf27d805bec29cb088bb0efed1a1d29f7548a6151398344969486d02ba6e32155c0b58452570f0c031207e4eeabf01db0b
-
SSDEEP
24576:3CGKLOvnkRd/WMqXqCb4VKMseaIuNCXmcPUHQCSIdf+ZkY0rHOmUK7DVqZ:3IsS/WMqXqWMdad3LhddEaHOfo
Malware Config
Extracted
raccoon
111a83bc76cd8d221f67303e6ef70a11
http://192.153.57.177:80
-
user_agent
MrBidenNeverKnow
Signatures
-
Raccoon Stealer V2 payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2608-7-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral1/memory/2608-9-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral1/memory/2608-11-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral1/memory/2608-101-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral1/memory/2608-110-0x0000000004F50000-0x0000000005729000-memory.dmp family_raccoon_v2 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
pMaD07a9.exeoobeldr.exepid process 2024 pMaD07a9.exe 1036 oobeldr.exe -
Loads dropped DLL 4 IoCs
Processes:
MSBuild.exepid process 2608 MSBuild.exe 2608 MSBuild.exe 2608 MSBuild.exe 2608 MSBuild.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 2692 set thread context of 2608 2692 file.exe MSBuild.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file.exeMSBuild.exepMaD07a9.exeschtasks.exeoobeldr.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pMaD07a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oobeldr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2332 schtasks.exe 1400 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
MSBuild.exepid process 2608 MSBuild.exe 2608 MSBuild.exe 2608 MSBuild.exe 2608 MSBuild.exe 2608 MSBuild.exe 2608 MSBuild.exe 2608 MSBuild.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
file.exeMSBuild.exepMaD07a9.exetaskeng.exeoobeldr.exedescription pid process target process PID 2692 wrote to memory of 2608 2692 file.exe MSBuild.exe PID 2692 wrote to memory of 2608 2692 file.exe MSBuild.exe PID 2692 wrote to memory of 2608 2692 file.exe MSBuild.exe PID 2692 wrote to memory of 2608 2692 file.exe MSBuild.exe PID 2692 wrote to memory of 2608 2692 file.exe MSBuild.exe PID 2692 wrote to memory of 2608 2692 file.exe MSBuild.exe PID 2692 wrote to memory of 2608 2692 file.exe MSBuild.exe PID 2692 wrote to memory of 2608 2692 file.exe MSBuild.exe PID 2692 wrote to memory of 2608 2692 file.exe MSBuild.exe PID 2608 wrote to memory of 2024 2608 MSBuild.exe pMaD07a9.exe PID 2608 wrote to memory of 2024 2608 MSBuild.exe pMaD07a9.exe PID 2608 wrote to memory of 2024 2608 MSBuild.exe pMaD07a9.exe PID 2608 wrote to memory of 2024 2608 MSBuild.exe pMaD07a9.exe PID 2024 wrote to memory of 2332 2024 pMaD07a9.exe schtasks.exe PID 2024 wrote to memory of 2332 2024 pMaD07a9.exe schtasks.exe PID 2024 wrote to memory of 2332 2024 pMaD07a9.exe schtasks.exe PID 2024 wrote to memory of 2332 2024 pMaD07a9.exe schtasks.exe PID 2940 wrote to memory of 1036 2940 taskeng.exe oobeldr.exe PID 2940 wrote to memory of 1036 2940 taskeng.exe oobeldr.exe PID 2940 wrote to memory of 1036 2940 taskeng.exe oobeldr.exe PID 2940 wrote to memory of 1036 2940 taskeng.exe oobeldr.exe PID 1036 wrote to memory of 1400 1036 oobeldr.exe schtasks.exe PID 1036 wrote to memory of 1400 1036 oobeldr.exe schtasks.exe PID 1036 wrote to memory of 1400 1036 oobeldr.exe schtasks.exe PID 1036 wrote to memory of 1400 1036 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Roaming\pMaD07a9.exe"C:\Users\Admin\AppData\Roaming\pMaD07a9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7D7022E8-83E1-4DC5-A202-786B6013C52D} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5f98745d81e8b84f39630844a63afc1ee
SHA1d7977c2dab5de25630f7d869f9b16a8502cd3bb3
SHA2569c34e13f0d2852fb4a8a53a4727a59d24691a507edb6ff1965024a6147799a83
SHA512e6b1bf12139e627d6aa2b25c9d7e8ebab1e86fc3025655bf88bc735413f55b10490f0237b8d11fd5db0eb6045f6176e93228c70d8e940a62ea4324816c31a3dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
Filesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
Filesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
Filesize
4.4MB
MD5af6e384dfabdad52d43cf8429ad8779c
SHA1c78e8cd8c74ad9d598f591de5e49f73ce3373791
SHA256f327c2b5ab1d98f0382a35cd78f694d487c74a7290f1ff7be53f42e23021e599
SHA512b55ba87b275a475e751e13ec9bac2e7f1a3484057844e210168e2256d73d9b6a7c7c7592845d4a3bf8163cf0d479315418a9f3cb8f2f4832af88a06867e3df93