Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 21:17
Static task
static1
Behavioral task
behavioral1
Sample
bf6e1e17b6afd813f73c7cffd16eb778_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bf6e1e17b6afd813f73c7cffd16eb778_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf6e1e17b6afd813f73c7cffd16eb778_JaffaCakes118.exe
-
Size
467KB
-
MD5
bf6e1e17b6afd813f73c7cffd16eb778
-
SHA1
017522977cbe8f44e829dfade75b22d161574695
-
SHA256
7116331436a96122d32c8dbfef9c7e78b5f1c3084b03105626f2ce4b8a5235eb
-
SHA512
3a49b43e6b5e3c4680f84d766a057a042b5f3bbfca19eafa931d7ac48f1f798f626042d61f2a7f6d8a2143c7e915f72a6bb2bd6d87e58dabf75ca0ab021fccb0
-
SSDEEP
12288:ceBEpbPCsM/bHQY49wkpvjQC3rq8I/Zf3Yjnb9we3yNwacdXu:IKbwD95jT0NkBwe3zr
Malware Config
Extracted
raccoon
5b9507f31300da17ee8b8729dce2bce0de872f9e
-
url4cnc
https://telete.in/j_1hannibal
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral2/memory/4336-2-0x0000000006AE0000-0x0000000006B70000-memory.dmp family_raccoon_v1 behavioral2/memory/4336-3-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral2/memory/4336-6-0x0000000006AE0000-0x0000000006B70000-memory.dmp family_raccoon_v1 behavioral2/memory/4336-5-0x0000000000400000-0x0000000004DF1000-memory.dmp family_raccoon_v1 behavioral2/memory/4336-7-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf6e1e17b6afd813f73c7cffd16eb778_JaffaCakes118.exe