Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 08:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe
-
Size
897KB
-
MD5
e08dfedc0393cb70831ed6947cf94657
-
SHA1
f8645da32e015bffc44616201765e50012d32d21
-
SHA256
a146a444ecb385d878cd8a82d1a4be07afefa4ee2efbb5080f52b340d8dde57c
-
SHA512
f3cfd0cc25c475ca4c738e1705470ef44bb8fe2a173620cd577144515df37f84a93aa81f6ac266f8b931f9933e57cc33998e021a3952510fc31685808623647d
-
SSDEEP
12288:XN1Soga7qlD8Ad3BIK5rgOBueUWsuTHtF9QBX9a0khFIQpxILDXGGlET9n/cHG:X5UD8mG6rHBPbSYmiG8cH
Malware Config
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral1/memory/2016-12-0x00000000004F0000-0x000000000057E000-memory.dmp family_raccoon_v1 behavioral1/memory/2016-13-0x0000000000400000-0x00000000004EB000-memory.dmp family_raccoon_v1 behavioral1/memory/2016-14-0x0000000000400000-0x00000000004EB000-memory.dmp family_raccoon_v1 behavioral1/memory/2016-17-0x00000000004F0000-0x000000000057E000-memory.dmp family_raccoon_v1 behavioral1/memory/2016-26-0x0000000000400000-0x00000000004EB000-memory.dmp family_raccoon_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 640 set thread context of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28 PID 640 wrote to memory of 2016 640 e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e08dfedc0393cb70831ed6947cf94657_JaffaCakes118.exe"2⤵PID:2016
-