Analysis Overview
SHA256
67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988
Threat Level: Known bad
The file 67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe was found to be: Known bad.
Malicious Activity Summary
Azorult family
Azorult
Raccoon
Raccoon Stealer V1 payload
Raccoon family
Oski family
Oski
Reads user/profile data of web browsers
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-23 23:45
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-23 23:45
Reported
2024-11-23 23:47
Platform
win7-20240903-en
Max time kernel
118s
Max time network
120s
Command Line
Signatures
Azorult
Azorult family
Oski
Oski family
Raccoon
Raccoon Stealer V1 payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Raccoon family
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
Reads user/profile data of web browsers
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2340 set thread context of 1868 | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe |
| PID 2888 set thread context of 2172 | N/A | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe |
| PID 2288 set thread context of 2768 | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
"C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe"
C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
"C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"
C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
"C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"
C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
"C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"
C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
"C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe"
C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
"C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 848
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | telegka.top | udp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | scarsa.ac.ug | udp |
| US | 8.8.8.8:53 | milsom.ac.ug | udp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | milsom.ac.ug | udp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | telegin.top | udp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
Files
memory/2888-2-0x0000000000230000-0x0000000000231000-memory.dmp
\Users\Admin\AppData\Local\Temp\Vtergfds.exe
| MD5 | 0a8854ddd119e42c62bf2904efb29c1c |
| SHA1 | 986ab504ca3cc36fc0418516f26aabc4168224d6 |
| SHA256 | 69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb |
| SHA512 | 905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7 |
C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
| MD5 | bbc3d625038de2cc64cbfdb76e888528 |
| SHA1 | 75b19ab88f8c23d0088252e8c725d4ceea56895a |
| SHA256 | 3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601 |
| SHA512 | 9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465 |
memory/2340-22-0x0000000000240000-0x0000000000241000-memory.dmp
memory/2340-24-0x0000000000440000-0x0000000000447000-memory.dmp
memory/2288-36-0x0000000000400000-0x0000000000443000-memory.dmp
memory/2768-47-0x0000000000400000-0x0000000000438000-memory.dmp
memory/2888-39-0x0000000000400000-0x00000000004FE000-memory.dmp
memory/1868-33-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2288-46-0x0000000000400000-0x0000000000443000-memory.dmp
memory/2172-44-0x0000000000400000-0x0000000000495000-memory.dmp
memory/2768-42-0x0000000000400000-0x0000000000438000-memory.dmp
memory/2172-38-0x0000000000400000-0x0000000000495000-memory.dmp
memory/1868-37-0x0000000000400000-0x0000000000420000-memory.dmp
memory/1868-31-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1868-28-0x0000000000400000-0x0000000000424000-memory.dmp
memory/2888-27-0x0000000000400000-0x00000000004FE000-memory.dmp
memory/1868-49-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1868-51-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2172-52-0x0000000000400000-0x0000000000491000-memory.dmp
memory/2768-53-0x0000000000400000-0x0000000000434000-memory.dmp
memory/2768-60-0x0000000000400000-0x0000000000438000-memory.dmp
memory/2768-61-0x0000000000400000-0x0000000000434000-memory.dmp
memory/2172-71-0x0000000000400000-0x0000000000491000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-23 23:45
Reported
2024-11-23 23:47
Platform
win10v2004-20241007-en
Max time kernel
114s
Max time network
120s
Command Line
Signatures
Azorult
Azorult family
Oski
Oski family
Raccoon
Raccoon Stealer V1 payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Raccoon family
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
Reads user/profile data of web browsers
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3224 set thread context of 4724 | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe |
| PID 4880 set thread context of 1032 | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe |
| PID 2472 set thread context of 2868 | N/A | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vereransa.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
"C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe"
C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
"C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"
C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
"C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"
C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
"C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"
C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
"C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"
C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
"C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1032 -ip 1032
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 1324
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 25.24.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | milsom.ac.ug | udp |
| US | 8.8.8.8:53 | scarsa.ac.ug | udp |
| US | 8.8.8.8:53 | telegka.top | udp |
| US | 8.8.8.8:53 | milsom.ac.ug | udp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | 21.138.155.104.in-addr.arpa | udp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | 98.208.201.84.in-addr.arpa | udp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.24.18.2.in-addr.arpa | udp |
| US | 104.155.138.21:80 | telegka.top | tcp |
Files
memory/2472-2-0x00000000777C2000-0x00000000777C3000-memory.dmp
memory/2472-3-0x00000000006F0000-0x00000000006F1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
| MD5 | 0a8854ddd119e42c62bf2904efb29c1c |
| SHA1 | 986ab504ca3cc36fc0418516f26aabc4168224d6 |
| SHA256 | 69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb |
| SHA512 | 905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7 |
C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
| MD5 | bbc3d625038de2cc64cbfdb76e888528 |
| SHA1 | 75b19ab88f8c23d0088252e8c725d4ceea56895a |
| SHA256 | 3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601 |
| SHA512 | 9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465 |
memory/3224-28-0x00000000005E0000-0x00000000005E1000-memory.dmp
memory/4880-31-0x0000000000600000-0x0000000000601000-memory.dmp
memory/4724-33-0x0000000000400000-0x0000000000424000-memory.dmp
memory/4724-36-0x0000000000400000-0x0000000000424000-memory.dmp
memory/4724-38-0x0000000000400000-0x0000000000424000-memory.dmp
memory/4724-39-0x0000000000400000-0x0000000000420000-memory.dmp
memory/3224-32-0x00000000005F0000-0x00000000005F7000-memory.dmp
memory/1032-44-0x0000000000400000-0x0000000000438000-memory.dmp
memory/1032-46-0x0000000000400000-0x0000000000434000-memory.dmp
memory/1032-43-0x0000000000400000-0x0000000000438000-memory.dmp
memory/1032-41-0x0000000000400000-0x0000000000438000-memory.dmp
memory/4880-40-0x0000000000400000-0x0000000000443000-memory.dmp
memory/4880-47-0x0000000000400000-0x0000000000443000-memory.dmp
memory/2868-49-0x0000000000400000-0x0000000000495000-memory.dmp
memory/2472-50-0x0000000000400000-0x00000000004FE000-memory.dmp
memory/2868-48-0x0000000000400000-0x0000000000495000-memory.dmp
memory/2472-52-0x0000000000400000-0x00000000004FE000-memory.dmp
memory/4724-53-0x0000000000400000-0x0000000000424000-memory.dmp
memory/4724-55-0x0000000000400000-0x0000000000420000-memory.dmp
memory/1032-58-0x0000000000400000-0x0000000000438000-memory.dmp
memory/1032-60-0x0000000000400000-0x0000000000434000-memory.dmp
memory/2868-61-0x0000000000400000-0x0000000000491000-memory.dmp