Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
ecb524a1bf1e1b5f919aaa4e24b5bee9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ecb524a1bf1e1b5f919aaa4e24b5bee9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ecb524a1bf1e1b5f919aaa4e24b5bee9_JaffaCakes118.exe
-
Size
419KB
-
MD5
ecb524a1bf1e1b5f919aaa4e24b5bee9
-
SHA1
813aeae00036bc6da3489242ce05834eda5948c9
-
SHA256
bcc0f71fad5febf1d9407ce8b184b24abc6f6ff3cad8c545daa4741ad37b18d2
-
SHA512
7e2d87da36b6d009780c1b81f6d9772134ade27870332ff75d012957d9bb3c8be25db7113a73e884ca4f052fc879a631d9dc0dd6fba4bbb61a65a3ee99c7e088
-
SSDEEP
6144:k/lb5uIDyR11lrfaLgAbyz5vm8++aHMsDwcwtJQ6VHVzklo6AfX03oOP:G1pYjtfaLg3a4tJLBJIAv03p
Malware Config
Extracted
raccoon
1.8.1
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3700-2-0x0000000002250000-0x00000000022E0000-memory.dmp family_raccoon_v1 behavioral2/memory/3700-3-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral2/memory/3700-5-0x0000000000400000-0x00000000004F0000-memory.dmp family_raccoon_v1 behavioral2/memory/3700-6-0x0000000002250000-0x00000000022E0000-memory.dmp family_raccoon_v1 behavioral2/memory/3700-7-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ecb524a1bf1e1b5f919aaa4e24b5bee9_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecb524a1bf1e1b5f919aaa4e24b5bee9_JaffaCakes118.exe