File name:

e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176

Full analysis: https://app.any.run/tasks/10932751-a9cd-4b28-b27e-aa8141002606
Verdict: Malicious activity
Threats:

Raccoon is an info stealer type malware available as a Malware as a Service. It can be obtained for a subscription and costs $200 per month. Raccoon malware has already infected over 100,000 devices and became one of the most mentioned viruses on the underground forums in 2019.

Analysis date: May 28, 2025, 22:53:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
raccoon
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

019CF2BA3C8A867A1559BD9A1A906D23

SHA1:

0A87A4B40D644FB48190DF48910FDD4C12100092

SHA256:

E332B72D489D6E9E956D2E5FB49865C95F7871CFA6785EE509809399D0928176

SSDEEP:

49152:g3tsC6LsZFa+UUcfEXr4jsun7d7FRnkM0I0DHOvjmE+w+w3mAa3/jFPP+EhEyh3f:ma+UHf24nd7F5L30DH1R

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe (PID: 5244)
    • Raccoon mutex has been detected

      • InstallUtil.exe (PID: 4976)
    • RACCOON has been detected (YARA)

      • InstallUtil.exe (PID: 4976)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe (PID: 5244)
    • Reads security settings of Internet Explorer

      • InstallUtil.exe (PID: 4976)
    • There is functionality for taking screenshot (YARA)

      • InstallUtil.exe (PID: 4976)
  • INFO

    • The sample compiled with english language support

      • e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe (PID: 5244)
    • Checks supported languages

      • e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe (PID: 5244)
      • InstallUtil.exe (PID: 4976)
    • Reads the machine GUID from the registry

      • e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe (PID: 5244)
      • InstallUtil.exe (PID: 4976)
    • Reads the computer name

      • e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe (PID: 5244)
      • InstallUtil.exe (PID: 4976)
    • Creates files or folders in the user directory

      • e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe (PID: 5244)
    • Launch of the file from Startup directory

      • e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe (PID: 5244)
    • Checks proxy server information

      • InstallUtil.exe (PID: 4976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Raccoon

(PID) Process(4976) InstallUtil.exe
C2 (1)http://45.15.156.141:80
Keys
xor5ff7bc68b712d0b2c95bc2d831e79eaf
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (49.4)
.scr | Windows screen saver (23.4)
.dll | Win32 Dynamic Link Library (generic) (11.7)
.exe | Win32 Executable (generic) (8)
.exe | Generic Win/DOS Executable (3.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:10:03 16:04:49+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 1306624
InitializedDataSize: 46080
UninitializedDataSize: -
EntryPoint: 0x140e2e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.27
ProductVersionNumber: 1.0.0.27
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unknown (04FC)
Comments: Ultra-modern defense strategy formulated to counteract unauthorized file activations, reinforcing system safety.
CompanyName: UltraShield Innovations Co.
FileDescription: UltraShield InstallGuardian Pro Plus
FileVersion: 1.0.0.27
InternalName: InstallGuardianProPlusUS.exe
LegalCopyright: Copyright © 2023 UltraShield Innovations Co. All rights defended.
LegalTrademarks: UltraShield, InstallGuardian Pro Plus, and the UltraShield sigil are sole properties of UltraShield Innovations Co.
OriginalFileName: InstallGuardianProPlusUS.exe
ProductName: UltraShield DefenseTech Installation Controller
ProductVersion: 1.0.0.27
AssemblyVersion: 1.0.0.27
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe #RACCOON installutil.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4976C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Raccoon
(PID) Process(4976) InstallUtil.exe
C2 (1)http://45.15.156.141:80
Keys
xor5ff7bc68b712d0b2c95bc2d831e79eaf
5244"C:\Users\admin\AppData\Local\Temp\e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe" C:\Users\admin\AppData\Local\Temp\e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe
explorer.exe
User:
admin
Company:
UltraShield Innovations Co.
Integrity Level:
MEDIUM
Description:
UltraShield InstallGuardian Pro Plus
Exit code:
0
Version:
1.0.0.27
Modules
Images
c:\users\admin\appdata\local\temp\e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6028C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
597
Read events
594
Write events
3
Delete events
0

Modification events

(PID) Process:(4976) InstallUtil.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4976) InstallUtil.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4976) InstallUtil.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5244e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exeC:\Users\admin\AppData\Roaming\programfilesexecutable
MD5:019CF2BA3C8A867A1559BD9A1A906D23
SHA256:E332B72D489D6E9E956D2E5FB49865C95F7871CFA6785EE509809399D0928176
5244e332b72d489d6e9e956d2e5fb49865c95f7871cfa6785ee509809399d0928176.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programfiles.vbstext
MD5:120BBC258B0516BA38A99CC06CA0F411
SHA256:46720EABA5BCDCB77CB64A8F5DD1945AFC492CDBAA00E6AB02F57AD1CCE982B7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
25
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.167:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6876
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6876
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5496
MoUsoCoreWorker.exe
23.48.23.167:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4976
InstallUtil.exe
45.15.156.141:80
Galaxy LLC
RU
unknown

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.167
  • 23.48.23.166
  • 23.48.23.194
  • 23.48.23.145
  • 23.48.23.173
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.130
  • 20.190.159.64
  • 40.126.31.1
  • 40.126.31.3
  • 20.190.159.73
  • 40.126.31.73
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
activation-v2.sls.microsoft.com
whitelisted

Threats

No threats detected
No debug info