Analysis
-
max time kernel
1s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/03/2025, 00:06
General
-
Target
0.exe
-
Size
449KB
-
MD5
7b20f5c61780fe383f45ca6e18ed5a6a
-
SHA1
bc9bfd59f0cde312cd9a0d20784887fed9b8c836
-
SHA256
26ccbcb079b3f0cc183293351c40da3146d2ddec9b4d6cd314090cfab94834df
-
SHA512
8a63f6ad20fe18bd49d055ae05bc81fe30d0ebfb25a37428b17b43569b53bf2560f0de8f993f62a2f5d458db78e6d24ad71fca8d7fd1133d3cb499dff356e68b
-
SSDEEP
12288:r7fSQUrrX/pC2Hwxx/Pb1JTUPd0o7Vzl:rzynxmPrrTUPdL7VJ
Malware Config
Signatures
-
Raccoon Stealer V1 payload 1 IoCs
resource yara_rule behavioral1/memory/4652-2-0x00000000038A0000-0x0000000003930000-memory.dmp family_raccoon_v1 -
Raccoon family
-
Program crash 1 IoCs
pid pid_target Process procid_target 3096 4652 WerFault.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0.exe"C:\Users\Admin\AppData\Local\Temp\0.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 2722⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4652 -ip 46521⤵PID:712