Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 23:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f493e9377ec11f1854eed4ad76991b4d_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
f493e9377ec11f1854eed4ad76991b4d_JaffaCakes118.exe
-
Size
456KB
-
MD5
f493e9377ec11f1854eed4ad76991b4d
-
SHA1
e7bee19e8244032b2ae0bb4acc2a7b3741d4789c
-
SHA256
a38ab2981af3a4b092722586161bd010b62843fde5b70db6ffdaf21f62bbf3bf
-
SHA512
4e2a845e15a0000f11de103cc9017dd97da04535d045040935d07112b9dcfec87d7ad84ac6ec3d9d1ed3d4706a0629ae24432599d149b3feaacfa61fc7432ee0
-
SSDEEP
6144:jYmldq0/7DOC78uZB2Q4Y4iyBrhUQbds8gl3HN4l8mS4MFHYNgWfk2cxb:jegKVu/4lfhUQ1gHNt4MuNbvcF
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/2868-2-0x0000000004A60000-0x0000000004AEF000-memory.dmp family_raccoon_v1 behavioral2/memory/2868-3-0x0000000000400000-0x0000000002D02000-memory.dmp family_raccoon_v1 behavioral2/memory/2868-4-0x0000000000400000-0x0000000002D02000-memory.dmp family_raccoon_v1 behavioral2/memory/2868-7-0x0000000004A60000-0x0000000004AEF000-memory.dmp family_raccoon_v1 -
Program crash 6 IoCs
pid pid_target Process procid_target 3856 2868 WerFault.exe 91 2436 2868 WerFault.exe 91 2384 2868 WerFault.exe 91 3960 2868 WerFault.exe 91 3584 2868 WerFault.exe 91 4052 2868 WerFault.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f493e9377ec11f1854eed4ad76991b4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f493e9377ec11f1854eed4ad76991b4d_JaffaCakes118.exe"1⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 7402⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 7762⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 7562⤵
- Program crash
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 8922⤵
- Program crash
PID:3960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 11482⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 11162⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2868 -ip 28681⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2868 -ip 28681⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2868 -ip 28681⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2868 -ip 28681⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2868 -ip 28681⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2868 -ip 28681⤵PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3096 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:4256