Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 10:59

General

  • Target

    f3595a5df5e76a707e45b3eb6c161ee6_JaffaCakes118.exe

  • Size

    594KB

  • MD5

    f3595a5df5e76a707e45b3eb6c161ee6

  • SHA1

    a55666d0e28bb8aa4c643c5969c70a1b096fb1a1

  • SHA256

    c3da65fded89c1b6e0ea8ed263eb3f381e374389de6617ba3f21165ab1cf005d

  • SHA512

    1c243d375e6fa5a73d5e1823ef9f3f9571dbb5b5226e868e623930ce7f1a80f974868f32c2202d90181d8edcad67c9e9f4e111bf20197da177322e947c481ece

  • SSDEEP

    12288:iINoFLYAm1jWcj59Sx57zrukYkEkNxLMLQRs:2FLS257GL72MEs

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3595a5df5e76a707e45b3eb6c161ee6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f3595a5df5e76a707e45b3eb6c161ee6_JaffaCakes118.exe"
    1⤵
      PID:3008

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3008-1-0x00000000035A0000-0x00000000036A0000-memory.dmp
      Filesize

      1024KB

    • memory/3008-2-0x0000000005040000-0x00000000050D1000-memory.dmp
      Filesize

      580KB

    • memory/3008-3-0x0000000000400000-0x000000000328F000-memory.dmp
      Filesize

      46.6MB

    • memory/3008-4-0x0000000000400000-0x000000000328F000-memory.dmp
      Filesize

      46.6MB

    • memory/3008-6-0x00000000035A0000-0x00000000036A0000-memory.dmp
      Filesize

      1024KB

    • memory/3008-7-0x0000000005040000-0x00000000050D1000-memory.dmp
      Filesize

      580KB