Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 03:13
Static task
static1
Behavioral task
behavioral1
Sample
90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe
Resource
win10v2004-20241007-en
General
-
Target
90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe
-
Size
226KB
-
MD5
4382f175e013a9467bbc82148770a623
-
SHA1
e2aa29c9dd92e67211bb1df92bfe27d16c428074
-
SHA256
90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312
-
SHA512
2f3eb4c4c6f0075935f4afc1ae2feb1858d6e0035993071083e6b12b93a4d807cd2b10f7798a948939dec021043ff17c1ea6360015d3fdc375389c370ddfda90
-
SSDEEP
6144:nXC/Er0LxFr05caPlAiGVAs0NbpzHuSs:nXpr0NFY5dNAiGVSN9zH
Malware Config
Extracted
raccoon
63267bc2317b9849c2d512a4e16b0f3b
http://shettester1000.com/
-
user_agent
TakeMyPainBack
Signatures
-
Raccoon family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4980 set thread context of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4980 wrote to memory of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82 PID 4980 wrote to memory of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82 PID 4980 wrote to memory of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82 PID 4980 wrote to memory of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82 PID 4980 wrote to memory of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82 PID 4980 wrote to memory of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82 PID 4980 wrote to memory of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82 PID 4980 wrote to memory of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82 PID 4980 wrote to memory of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82 PID 4980 wrote to memory of 1556 4980 90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe"C:\Users\Admin\AppData\Local\Temp\90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe"C:\Users\Admin\AppData\Local\Temp\90dda549593a7eaee8ce4c868ee1fbbfa7814ef660af560d2cb44650d26ce312.exe"2⤵PID:1556
-