Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 16:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ea78f64a65ade7f40a56f106b666092d_JaffaCakes118.exe
Resource
win7-20240215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
ea78f64a65ade7f40a56f106b666092d_JaffaCakes118.exe
-
Size
496KB
-
MD5
ea78f64a65ade7f40a56f106b666092d
-
SHA1
7aeb248f2a5dafa1a7a67516a955f255d7190184
-
SHA256
9bc7005b8ede7f8de8210326af0a50af7329ff548093b288a78e1447da20c91a
-
SHA512
4df1e05b5ef77715de329a8d0dbd4ee6f0a767a16ccd7f01fa9624898eec948607959e7663be96fa9ca67c00d0258ffc1f2f5c262b98de44f7c22ff50b9d6dea
-
SSDEEP
12288:QFXx3LOtgWmYYz3U36oeg8f0bs0oMZvKRjOY:QFhc2Jjf0wDoY
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/1104-2-0x00000000049A0000-0x0000000004A33000-memory.dmp family_raccoon_v1 behavioral2/memory/1104-3-0x0000000000400000-0x0000000002CB2000-memory.dmp family_raccoon_v1 behavioral2/memory/1104-4-0x0000000000400000-0x0000000002CB2000-memory.dmp family_raccoon_v1 behavioral2/memory/1104-7-0x00000000049A0000-0x0000000004A33000-memory.dmp family_raccoon_v1
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea78f64a65ade7f40a56f106b666092d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea78f64a65ade7f40a56f106b666092d_JaffaCakes118.exe"1⤵PID:1104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:3916