Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 18:48

General

  • Target

    c15a34f4a416bd5e37575a1ac2d013c9_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    c15a34f4a416bd5e37575a1ac2d013c9

  • SHA1

    70857e856bb17deafa260c0db298137cb55873c5

  • SHA256

    18efcaf65d07160fd0dc967c8303946981aad1a1ca5c6ad9ee5815c34cacde0e

  • SHA512

    d81d4f1ba77bc07590641697c135290a07d6b8895e081d06134a9cdd13d42d0b295b3ef0aa7fd576d51b60d062ccab9119fecdbd1afe5e01684a1cff8f58804f

  • SSDEEP

    24576:rT7AC5h5fd9D0mzmjC0ejRBqkYAqYh+GcJTAigI3OE9ORXKu/2RYIe2KyWeu+u2I:jAS7fQRCD3dfwGA3gqOmc2RLe2anoGb

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 10 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 12 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c15a34f4a416bd5e37575a1ac2d013c9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c15a34f4a416bd5e37575a1ac2d013c9_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2632-0-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-1-0x0000000077320000-0x0000000077322000-memory.dmp

    Filesize

    8KB

  • memory/2632-2-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-4-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-3-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-5-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-8-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-7-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-6-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-9-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-10-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-15-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB

  • memory/2632-21-0x0000000000E00000-0x000000000134B000-memory.dmp

    Filesize

    5.3MB