Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
f4950d0ab093fcb3cedd0b4333e55c27_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f4950d0ab093fcb3cedd0b4333e55c27_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f4950d0ab093fcb3cedd0b4333e55c27_JaffaCakes118.exe
-
Size
510KB
-
MD5
f4950d0ab093fcb3cedd0b4333e55c27
-
SHA1
0093fe7d895d942d5f6486cdc0d0b7c413e497f7
-
SHA256
25a718d24e04f5b7bfce0ceb2c073b5d5fdd1809d448ffc8f4fa0a2a9d9190ad
-
SHA512
1fff63cd372a020774fc7bac1aa960b3ac27fe30ea846a77f5ee5f198120738ac21a4bc58c35ca7c9f8dc37a8fe0c7616291ead399c882f4755ed08079f88f65
-
SSDEEP
12288:5joVTBdpkrjaXa18aubb+9xb/hKhFmwSflOPn:yvv0GZaU+DhKhFmfO
Malware Config
Extracted
raccoon
1.7.2
ba9d5e6ba2ad40b248bebad44cbd1392c7d8840a
-
url4cnc
https://tttttt.me/ackinreik3
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral1/memory/2172-2-0x0000000000940000-0x00000000009D2000-memory.dmp family_raccoon_v1 behavioral1/memory/2172-3-0x0000000000400000-0x0000000000494000-memory.dmp family_raccoon_v1 behavioral1/memory/2172-4-0x0000000000940000-0x00000000009D2000-memory.dmp family_raccoon_v1 behavioral1/memory/2172-7-0x0000000000400000-0x0000000000494000-memory.dmp family_raccoon_v1 behavioral1/memory/2172-6-0x0000000000400000-0x00000000008CC000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4950d0ab093fcb3cedd0b4333e55c27_JaffaCakes118.exe