Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:53
Behavioral task
behavioral1
Sample
fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe
Resource
win7-20240903-en
windows7-x64
12 signatures
150 seconds
General
-
Target
fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe
-
Size
491KB
-
MD5
b713197714faacaf16f0a7a3c2dd09fe
-
SHA1
4f19a9666536c695d8d99ab7745c2bf7a543feda
-
SHA256
fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97
-
SHA512
4ba7a836ace16cfd56855896ba0e06a1eb7ded68a2d0c605ef99acf975ab220364f3f3f8847a22085b34d1c0a09adaefdebfafeca49fc72524daf40cd0455ee7
-
SSDEEP
12288:gYbP2dcxBJ81d0WlpNlLrTOshx4UnTOt4olSZVvTFlm4ng:gYD2dkJ8EypNlT7at7MjTrmeg
Malware Config
Signatures
-
Raccoon family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 4 drive.google.com -
Program crash 1 IoCs
pid pid_target Process procid_target 3432 4888 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe"C:\Users\Admin\AppData\Local\Temp\fde80c40258088be97efdc3c64bd85637a4ca4ad580c1542c001d50d10a09c97.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 11962⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4888 -ip 48881⤵PID:3780