Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
ecb524a1bf1e1b5f919aaa4e24b5bee9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ecb524a1bf1e1b5f919aaa4e24b5bee9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ecb524a1bf1e1b5f919aaa4e24b5bee9_JaffaCakes118.exe
-
Size
419KB
-
MD5
ecb524a1bf1e1b5f919aaa4e24b5bee9
-
SHA1
813aeae00036bc6da3489242ce05834eda5948c9
-
SHA256
bcc0f71fad5febf1d9407ce8b184b24abc6f6ff3cad8c545daa4741ad37b18d2
-
SHA512
7e2d87da36b6d009780c1b81f6d9772134ade27870332ff75d012957d9bb3c8be25db7113a73e884ca4f052fc879a631d9dc0dd6fba4bbb61a65a3ee99c7e088
-
SSDEEP
6144:k/lb5uIDyR11lrfaLgAbyz5vm8++aHMsDwcwtJQ6VHVzklo6AfX03oOP:G1pYjtfaLg3a4tJLBJIAv03p
Malware Config
Extracted
raccoon
1.8.1
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2824-2-0x0000000000300000-0x0000000000390000-memory.dmp family_raccoon_v1 behavioral1/memory/2824-3-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral1/memory/2824-5-0x0000000000400000-0x00000000004F0000-memory.dmp family_raccoon_v1 behavioral1/memory/2824-6-0x0000000000300000-0x0000000000390000-memory.dmp family_raccoon_v1 behavioral1/memory/2824-7-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ecb524a1bf1e1b5f919aaa4e24b5bee9_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecb524a1bf1e1b5f919aaa4e24b5bee9_JaffaCakes118.exe