Overview
overview
10Static
static
1Readm.md/cef.js
windows7-x64
3Readm.md/cef.js
windows10-2004-x64
3Readm.md/c...ent.js
windows7-x64
3Readm.md/c...ent.js
windows10-2004-x64
3Readm.md/c...ent.js
windows7-x64
3Readm.md/c...ent.js
windows10-2004-x64
3Readm.md/c...lf.dll
windows7-x64
3Readm.md/c...lf.dll
windows10-2004-x64
3Readm.md/w...11.dll
windows7-x64
3Readm.md/w...11.dll
windows10-2004-x64
3lnstaIIer .x64.exe
windows7-x64
1lnstaIIer .x64.exe
windows10-2004-x64
10Analysis
-
max time kernel
93s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
Readm.md/cef.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Readm.md/cef.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Readm.md/cef_100_percent.js
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Readm.md/cef_100_percent.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Readm.md/cef_200_percent.js
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Readm.md/cef_200_percent.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Readm.md/chrome_elf.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Readm.md/chrome_elf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Readm.md/wow64/YandexDisk3ShellExt-1511.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Readm.md/wow64/YandexDisk3ShellExt-1511.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
lnstaIIer .x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
lnstaIIer .x64.exe
Resource
win10v2004-20241007-en
General
-
Target
lnstaIIer .x64.exe
-
Size
721.0MB
-
MD5
ee565419e54ff8de8d71828451689736
-
SHA1
96efd5bdd34d6d1718559af2402e171b346f4c77
-
SHA256
29c4b60a24c0eef090b656c1a33b0284a778232f422a4fb400ce1975bf21d45a
-
SHA512
69273467477303dfddc05a663f540968356e08d4aea7a4bd11510a5729dcd8ff80386754e3c7efadea532c7fe359fa6436782c350323bbf60c2efe1b005565f4
-
SSDEEP
98304:y9EALOORkif751Ic2+a8fsf7xrkKDCIwl7llkCwpqfRzWOmCuOONWiR:ydi4XrXa8f0533wlDlUepXi
Malware Config
Extracted
raccoon
cf2a14f386eb5250ef280df942436e77
http://88.119.171.209/
-
user_agent
TakeMyPainBack
Signatures
-
Raccoon family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 100140 2240 lnstaIIer .x64.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnstaIIer .x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 lnstaIIer .x64.exe 2240 lnstaIIer .x64.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2240 wrote to memory of 100140 2240 lnstaIIer .x64.exe 82 PID 2240 wrote to memory of 100140 2240 lnstaIIer .x64.exe 82 PID 2240 wrote to memory of 100140 2240 lnstaIIer .x64.exe 82 PID 2240 wrote to memory of 100140 2240 lnstaIIer .x64.exe 82 PID 2240 wrote to memory of 100140 2240 lnstaIIer .x64.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\lnstaIIer .x64.exe"C:\Users\Admin\AppData\Local\Temp\lnstaIIer .x64.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:100140
-