Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2024 02:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
64f970c3806f847d3465cc48a3955338_JaffaCakes118.exe
Resource
win7-20240215-en
2 signatures
150 seconds
General
-
Target
64f970c3806f847d3465cc48a3955338_JaffaCakes118.exe
-
Size
582KB
-
MD5
64f970c3806f847d3465cc48a3955338
-
SHA1
42e357b71158c476b5a4b3e38d40dd87cb9bc6f3
-
SHA256
35d9bca5a3ae3990cf7c1e73f192600e7eddefda636d8594e1e3983e73fef941
-
SHA512
c41a9df0bb65e06b78c8c6a885c3986473ff0e858ce217a2dba75589782de24d27152e604b5087f0b87a83ca88b6785cf7ad4c54652b80130971d849a1676eab
-
SSDEEP
12288:HFP5L6jjzxGsXPMnLrnw0tIMMElDMgGAyKrqORrRLzchK8fS99w8:Hx5GjZx/MnXwbMME+gG8rtzchKq
Malware Config
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3124-2-0x0000000002410000-0x000000000249E000-memory.dmp family_raccoon_v1 behavioral2/memory/3124-3-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1 behavioral2/memory/3124-4-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1 behavioral2/memory/3124-7-0x0000000002410000-0x000000000249E000-memory.dmp family_raccoon_v1 behavioral2/memory/3124-13-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1