Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
c18bb625859c7e26ae798cb679938edb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c18bb625859c7e26ae798cb679938edb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c18bb625859c7e26ae798cb679938edb_JaffaCakes118.exe
-
Size
513KB
-
MD5
c18bb625859c7e26ae798cb679938edb
-
SHA1
0f42269c66bc39def5b6953600fa2666da588aca
-
SHA256
a1fbf4c01b9cbd00eb95d3080423c2e2ce57c1025beb520b482b258b84b0e8db
-
SHA512
64cd271d23e32de62dd3b388a5e53480ab47218808808df66dbf181f9854a33503bd239c30ade21418cb41d5608a18c991652249c1aa7f82b02f2e4802069e57
-
SSDEEP
12288:5o6dW0obl7zxBloV9bQRmOOCpZIqoXBNDowqLQ:ZTodHAKmOppZIz0LQ
Malware Config
Extracted
raccoon
1.8.2
7f6d1759a7e436f9422adfda53777b5d9a045344
-
url4cnc
http://teletop.top/tika31ramencomp
http://teleta.top/tika31ramencomp
https://t.me/tika31ramencomp
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral2/memory/3044-2-0x00000000008B0000-0x000000000093E000-memory.dmp family_raccoon_v1 behavioral2/memory/3044-3-0x0000000000400000-0x0000000000490000-memory.dmp family_raccoon_v1 behavioral2/memory/3044-5-0x00000000008B0000-0x000000000093E000-memory.dmp family_raccoon_v1 behavioral2/memory/3044-7-0x0000000000400000-0x0000000000490000-memory.dmp family_raccoon_v1 behavioral2/memory/3044-6-0x0000000000400000-0x00000000008B0000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c18bb625859c7e26ae798cb679938edb_JaffaCakes118.exe