Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe
-
Size
637KB
-
MD5
f8e8da4bcb00ac0f4c52392719c7361e
-
SHA1
accedfe263fca73d78eab360f7afe9d131b062bd
-
SHA256
97efb8b6fc0c9b84e02a02372ec9e6b0bfb95cadd63d9941d7815d58adc5849e
-
SHA512
aa3614c91419afdcfb7f8ae0bc603580289434d439d0f6fed31c5ea4ab97ba7beb5973f7560f4f12ea0bdf5cea842ff84cf8f587b7bf79e182ba378df22a07e5
-
SSDEEP
12288:fBkZSz9rGUB1dn/ydLhWKJYBp7AtK/Gl91dmdLG8kOwCDA:feSzZGUBeZcGYPMeG8k/y
Malware Config
Extracted
raccoon
89379f5371f470435351b0d002d50f28a65fff02
-
url4cnc
https://drive.google.com/uc?export=download&id=1jN5ZmsLRZEQEtxsUIIVXnSOKaqBdnX6Z
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral1/memory/2944-8-0x0000000000400000-0x0000000000489000-memory.dmp family_raccoon_v1 behavioral1/memory/2944-10-0x0000000000400000-0x0000000000489000-memory.dmp family_raccoon_v1 behavioral1/memory/2944-12-0x0000000000400000-0x0000000000489000-memory.dmp family_raccoon_v1 behavioral1/memory/2944-14-0x0000000000400000-0x0000000000489000-memory.dmp family_raccoon_v1 behavioral1/memory/2944-16-0x0000000000400000-0x0000000000489000-memory.dmp family_raccoon_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2128 set thread context of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2804 2944 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2328 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 29 PID 2128 wrote to memory of 2328 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 29 PID 2128 wrote to memory of 2328 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 29 PID 2128 wrote to memory of 2328 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 29 PID 2128 wrote to memory of 2328 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 29 PID 2128 wrote to memory of 2328 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 29 PID 2128 wrote to memory of 2328 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 29 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2944 2128 f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe 30 PID 2944 wrote to memory of 2804 2944 RegAsm.exe 31 PID 2944 wrote to memory of 2804 2944 RegAsm.exe 31 PID 2944 wrote to memory of 2804 2944 RegAsm.exe 31 PID 2944 wrote to memory of 2804 2944 RegAsm.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8e8da4bcb00ac0f4c52392719c7361e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 2563⤵
- Program crash
PID:2804
-
-