Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 03:49
Static task
static1
Behavioral task
behavioral1
Sample
ecc973cf6a6cd2c803255c9f120d5aaa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecc973cf6a6cd2c803255c9f120d5aaa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ecc973cf6a6cd2c803255c9f120d5aaa_JaffaCakes118.exe
-
Size
548KB
-
MD5
ecc973cf6a6cd2c803255c9f120d5aaa
-
SHA1
f90d672fd09b13364d561acb9e1965d7cdef6a68
-
SHA256
0f3d1f1eafa140c32e246c12a7ccd5b6205526ad08be581e5f55b9179f19be5a
-
SHA512
b385f5eb676484862d19aa805a6995f85462e7399e7068cba458b9e362b9dfd1cca12b8fdd7c406f0be2a7bef191b4c6668e4012aae22c6c67436cf8d891ced2
-
SSDEEP
12288:tqsDzNra3a8OT9SdU52j/C/rGLjTGrI6jQn/Xo/Gzxp6L:tFDzN+OZSm2uD6WknQC36L
Malware Config
Extracted
raccoon
1.8.1
5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4
-
url4cnc
https://t.me/agrybirdsgamerept
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/732-2-0x00000000005C0000-0x0000000000650000-memory.dmp family_raccoon_v1 behavioral2/memory/732-3-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral2/memory/732-5-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral2/memory/732-6-0x00000000005C0000-0x0000000000650000-memory.dmp family_raccoon_v1 behavioral2/memory/732-7-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ecc973cf6a6cd2c803255c9f120d5aaa_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecc973cf6a6cd2c803255c9f120d5aaa_JaffaCakes118.exe