Malware Analysis Report

2024-10-23 21:53

Sample ID 240402-nkq8fagd9t
Target 8b4d459e1f039599cfbab999454921da_JaffaCakes118
SHA256 1ef182e9f60e7820cd39d76dd43b368c0728f8027c5e979b00ae3e40c5821bfc
Tags
raccoon 27c9b6ae257af0ad6f3f3330ea633fc782fa4daf stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1ef182e9f60e7820cd39d76dd43b368c0728f8027c5e979b00ae3e40c5821bfc

Threat Level: Known bad

The file 8b4d459e1f039599cfbab999454921da_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

raccoon 27c9b6ae257af0ad6f3f3330ea633fc782fa4daf stealer

Raccoon

Raccoon Stealer V1 payload

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-02 11:27

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-02 11:27

Reported

2024-04-02 11:30

Platform

win7-20240221-en

Max time kernel

142s

Max time network

138s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8b4d459e1f039599cfbab999454921da_JaffaCakes118.exe"

Signatures

Raccoon

stealer raccoon

Raccoon Stealer V1 payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8b4d459e1f039599cfbab999454921da_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\8b4d459e1f039599cfbab999454921da_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 teletop.top udp
RU 193.201.126.48:80 teletop.top tcp
RU 193.201.126.48:80 teletop.top tcp
RU 193.201.126.48:80 teletop.top tcp
RU 193.201.126.48:80 teletop.top tcp
RU 193.201.126.48:80 teletop.top tcp

Files

memory/1976-0-0x00000000007C0000-0x0000000000851000-memory.dmp

memory/1976-6-0x00000000007C0000-0x0000000000851000-memory.dmp

memory/1976-7-0x0000000000500000-0x0000000000627000-memory.dmp

memory/1976-9-0x00000000007C0000-0x0000000000851000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-02 11:27

Reported

2024-04-02 11:30

Platform

win10v2004-20240226-en

Max time kernel

148s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8b4d459e1f039599cfbab999454921da_JaffaCakes118.exe"

Signatures

Raccoon

stealer raccoon

Raccoon Stealer V1 payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8b4d459e1f039599cfbab999454921da_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\8b4d459e1f039599cfbab999454921da_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 teletop.top udp
RU 193.201.126.48:80 teletop.top tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
RU 193.201.126.48:80 teletop.top tcp
US 8.8.8.8:53 24.66.18.2.in-addr.arpa udp
RU 193.201.126.48:80 teletop.top tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
RU 193.201.126.48:80 teletop.top tcp
RU 193.201.126.48:80 teletop.top tcp
US 8.8.8.8:53 40.173.79.40.in-addr.arpa udp

Files

memory/3596-0-0x0000000000BE0000-0x0000000000C71000-memory.dmp

memory/3596-6-0x0000000000BE0000-0x0000000000C71000-memory.dmp

memory/3596-7-0x0000000000500000-0x0000000000627000-memory.dmp

memory/3596-9-0x0000000000BE0000-0x0000000000C71000-memory.dmp