| File name: | sample2.exe |
| Full analysis: | https://app.any.run/tasks/a1f69fc3-ee52-4c92-a155-606f9f4e10a3 |
| Verdict: | Malicious activity |
| Threats: | Raccoon is an info stealer type malware available as a Malware as a Service. It can be obtained for a subscription and costs $200 per month. Raccoon malware has already infected over 100,000 devices and became one of the most mentioned viruses on the underground forums in 2019. |
| Analysis date: | March 18, 2025, 14:25:09 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections |
| MD5: | DD1B734796B4AA40AF46B4D69E1E2DA2 |
| SHA1: | 1EC7529315ECC251D2D71C2D684DC2ECF3A931B1 |
| SHA256: | 837EB41E90A4CE53EEB107E3AD39C7BAA22ADFAE133E0FF2672ECD3A323F7B04 |
| SSDEEP: | 49152:6k+hsGgporJg5ZOvQcOhxEVyrLNxHowXaCqGcuZbgo3cbiVgTDavs9t4zB:t+fgpoOOYJXNxHvXGGcuZbgoMbiVu2v7 |
| .exe | | | InstallShield setup (49.2) |
|---|---|---|
| .exe | | | Win32 Executable Delphi generic (16.2) |
| .scr | | | Windows screen saver (14.9) |
| .dll | | | Win32 Dynamic Link Library (generic) (7.5) |
| .exe | | | Win32 Executable (generic) (5.1) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1992:06:19 22:22:17+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 148992 |
| InitializedDataSize: | 31744 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x25468 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.1.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| Comments: | - |
| CompanyName: | wotsuper |
| FileDescription: | wotsuper 2.1 Installation |
| FileVersion: | 2.1 |
| LegalCopyright: | wotsuper |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 128 | "C:\Users\admin\AppData\Local\Temp\sample2.exe" | C:\Users\admin\AppData\Local\Temp\sample2.exe | explorer.exe | ||||||||||||
User: admin Company: wotsuper Integrity Level: HIGH Description: wotsuper 2.1 Installation Exit code: 0 Version: 2.1 Modules
| |||||||||||||||
| 580 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=2840 --field-trial-handle=1252,i,7079877349312640908,6061093022994916704,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Version: 109.0.1518.115 Modules
| |||||||||||||||
| 604 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3704 --field-trial-handle=1252,i,7079877349312640908,6061093022994916704,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1032 | "C:\Windows\regedit.exe" \s C:\Windows\wotsuper.reg | C:\Windows\regedit.exe | — | sample2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Editor Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1080 | C:\Windows\system32\svchost.exe -k NetworkService | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1224 | "C:\Users\admin\AppData\Local\Temp\sample2.exe" | C:\Users\admin\AppData\Local\Temp\sample2.exe | — | explorer.exe | |||||||||||
User: admin Company: wotsuper Integrity Level: MEDIUM Description: wotsuper 2.1 Installation Exit code: 3221226540 Version: 2.1 Modules
| |||||||||||||||
| 1748 | "C:\Program Files\wotsuper\wotsuper\wotsuper.exe" | C:\Program Files\wotsuper\wotsuper\wotsuper.exe | sample2.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 1880 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1Ldta7.html | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | sample2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Edge Exit code: 1 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 2592 | "C:\Program Files\wotsuper\wotsuper\wotsuper1.exe" | C:\Program Files\wotsuper\wotsuper\wotsuper1.exe | sample2.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 2656 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1smEq7.html | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | sample2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| (PID) Process: | (128) sample2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1 |
| Operation: | write | Name: | DisplayName |
Value: wotsuper 2.1 | |||
| (PID) Process: | (128) sample2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1 |
| Operation: | write | Name: | DisplayVersion |
Value: 2.1 | |||
| (PID) Process: | (128) sample2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1 |
| Operation: | write | Name: | VersionMajor |
Value: 2 | |||
| (PID) Process: | (128) sample2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1 |
| Operation: | write | Name: | VersionMinor |
Value: 1 | |||
| (PID) Process: | (128) sample2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1 |
| Operation: | write | Name: | Publisher |
Value: wotsuper | |||
| (PID) Process: | (128) sample2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1 |
| Operation: | write | Name: | DisplayIcon |
Value: C:\Program Files\wotsuper\wotsuper\Uninstall.exe | |||
| (PID) Process: | (128) sample2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1 |
| Operation: | write | Name: | UninstallString |
Value: C:\Program Files\wotsuper\wotsuper\Uninstall.exe | |||
| (PID) Process: | (128) sample2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1 |
| Operation: | write | Name: | URLInfoAbout |
Value: http://www.wotsuper.com/ | |||
| (PID) Process: | (128) sample2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1 |
| Operation: | write | Name: | HelpLink |
Value: wotsuper@company.com | |||
| (PID) Process: | (128) sample2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\wotsuper 2.1 |
| Operation: | write | Name: | InstallLocation |
Value: C:\Program Files\wotsuper\wotsuper\ | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2592 | wotsuper1.exe | C:\ProgramData\7A7MDPOP4N5IGDQFCFGDZH28V\files\passwords.txt | text | |
MD5:E0EE1892004A327AE8878494352A35E6 | SHA256:E1B782EB670A6D8ED01FEB9CD9DDEF9AE20569B72A1E33E078906D07627F7850 | |||
| 128 | sample2.exe | C:\Users\admin\AppData\Local\Temp\$inst\temp_0.tmp | compressed | |
MD5:A3E6D0A5A1074040F5AD76A7535F3D76 | SHA256:3B25C297F17BD5D2AAC3D3B27C57FD7C749C2D15F43E1A8CF899158138A9A708 | |||
| 1880 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Variations | binary | |
MD5:961E3604F228B0D10541EBF921500C86 | SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED | |||
| 3216 | msedge.exe | — | ||
MD5:— | SHA256:— | |||
| 128 | sample2.exe | C:\Program Files\wotsuper\wotsuper\Uninstall.ini | text | |
MD5:72029B01C6667D1CB7945CE3C99FCB32 | SHA256:60DEFD21A46328A7FF9C16A46B9D1791E85A2E548BBD22582646AA60FE9116C8 | |||
| 128 | sample2.exe | C:\Users\admin\AppData\Local\Temp\$inst\2.tmp | compressed | |
MD5:8708699D2C73BED30A0A08D80F96D6D7 | SHA256:A32E0A83001D2C5D41649063217923DAC167809CAB50EC5784078E41C9EC0F0F | |||
| 128 | sample2.exe | C:\Windows\wotsuper.reg | text | |
MD5:42F073434559FB6B9C67ABA86DE89D1B | SHA256:03AC69047BCE954FDCE3D00AF881161A073F921D73FF79369E9EE96A109F9EED | |||
| 3296 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF189ff4.TMP | — | |
MD5:— | SHA256:— | |||
| 3296 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 3044 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics.pma | binary | |
MD5:886E82F2CA62ECCCE64601B30592078A | SHA256:E5E13D53601100FF3D6BB71514CBCCC4C73FE9B7EF5E930100E644187B42948E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2592 | wotsuper1.exe | POST | 200 | 208.95.112.1:80 | http://ip-api.com/line/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
1748 | wotsuper.exe | 199.59.243.228:443 | telete.in | AMAZON-02 | US | shared |
2592 | wotsuper1.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | whitelisted |
2920 | msedge.exe | 13.107.42.16:443 | config.edge.skype.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3296 | msedge.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2920 | msedge.exe | 13.107.21.239:443 | edge.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
2920 | msedge.exe | 172.67.74.161:443 | iplogger.org | CLOUDFLARENET | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
telete.in |
| shared |
manillamemories.com |
| unknown |
ip-api.com |
| whitelisted |
config.edge.skype.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |
iplogger.org |
| whitelisted |
www.bing.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
2592 | wotsuper1.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
1080 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
2592 | wotsuper1.exe | A Network Trojan was detected | ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern |
2920 | msedge.exe | Potential Corporate Privacy Violation | ET INFO IP Check Domain (iplogger .org in DNS Lookup) |
2920 | msedge.exe | Potential Corporate Privacy Violation | ET INFO IP Check Domain (iplogger .org in DNS Lookup) |
2920 | msedge.exe | Potential Corporate Privacy Violation | ET INFO IP Check Domain (iplogger .org in TLS SNI) |