Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 14:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fcf272ea4e9a7e3fcaecfdcfb26cbd97_JaffaCakes118.exe
Resource
win7-20240220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
fcf272ea4e9a7e3fcaecfdcfb26cbd97_JaffaCakes118.exe
-
Size
535KB
-
MD5
fcf272ea4e9a7e3fcaecfdcfb26cbd97
-
SHA1
ff69bd1ec96fb6ca44f73a829f937b3d29168342
-
SHA256
7d488eb1040f11cfdf31e5cc017f253bc9050bae1cfd474492018c314504c9bd
-
SHA512
c327f371b606bd5873047469f9c210d6183506a25f58e86acb62385f8bad9eeee908cdb160d95f42f9e9f630eeab65d13542700bbe2ff012c3dd1dba96f621e0
-
SSDEEP
12288:tAHOVUBtvt5t4LTl3brVqOyBQxzYk16xhsTQh7ekN2:tuxvt5sZHVKGahsTQhekN
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/2296-2-0x00000000031D0000-0x0000000003261000-memory.dmp family_raccoon_v1 behavioral2/memory/2296-3-0x0000000000400000-0x0000000001457000-memory.dmp family_raccoon_v1 behavioral2/memory/2296-4-0x0000000000400000-0x0000000001457000-memory.dmp family_raccoon_v1 behavioral2/memory/2296-7-0x00000000031D0000-0x0000000003261000-memory.dmp family_raccoon_v1
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcf272ea4e9a7e3fcaecfdcfb26cbd97_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fcf272ea4e9a7e3fcaecfdcfb26cbd97_JaffaCakes118.exe"1⤵PID:2296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:1196