Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
1aa954280ff704582990fa686a91f1d142b21000a36a5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1aa954280ff704582990fa686a91f1d142b21000a36a5.exe
Resource
win10v2004-20241007-en
General
-
Target
1aa954280ff704582990fa686a91f1d142b21000a36a5.exe
-
Size
17.9MB
-
MD5
48b7e5a3b1f5ffb2aaecc7ff5d8e3d97
-
SHA1
689aeb40df545d3ef9f0dbe85cca836a6d0ce8f5
-
SHA256
1aa954280ff704582990fa686a91f1d142b21000a36a55794cb5dfba05274eb5
-
SHA512
c984e1888c847aada0f5e5eeabcee8ebbce66ba86dde46e00bff47e90ba2cf44585758c021f3d19098b161abb9d22a0249250ac67ea5f73bbed455344ab8196c
-
SSDEEP
393216:aV+4mXtJ0Nm8ealfbIX8vEBQvefBj0Mos7hvvTXv3s6x6TmJfSg:s2SmwDIMSVBwMf9Hjv3sBTm0g
Malware Config
Extracted
raccoon
5937a1bd499cd3cb596ec1995a9baf6a
http://94.228.169.161:80/
-
user_agent
MrBidenNeverKnow
Signatures
-
Raccoon Stealer V2 payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2784-12-0x0000000000400000-0x0000000002004000-memory.dmp family_raccoon_v2 behavioral1/memory/2784-13-0x0000000000400000-0x0000000002004000-memory.dmp family_raccoon_v2 behavioral1/memory/2784-14-0x0000000000400000-0x0000000002004000-memory.dmp family_raccoon_v2 behavioral1/memory/2784-15-0x0000000000400000-0x0000000002004000-memory.dmp family_raccoon_v2 behavioral1/memory/2784-18-0x0000000000400000-0x0000000002004000-memory.dmp family_raccoon_v2 -
Raccoon family
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
1aa954280ff704582990fa686a91f1d142b21000a36a5.exepid process 2784 1aa954280ff704582990fa686a91f1d142b21000a36a5.exe 2784 1aa954280ff704582990fa686a91f1d142b21000a36a5.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1aa954280ff704582990fa686a91f1d142b21000a36a5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1aa954280ff704582990fa686a91f1d142b21000a36a5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1aa954280ff704582990fa686a91f1d142b21000a36a5.exepid process 2784 1aa954280ff704582990fa686a91f1d142b21000a36a5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa954280ff704582990fa686a91f1d142b21000a36a5.exe"C:\Users\Admin\AppData\Local\Temp\1aa954280ff704582990fa686a91f1d142b21000a36a5.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784