Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
0ec29ace31a4ced1e8a47792f1bdb019_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ec29ace31a4ced1e8a47792f1bdb019_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ec29ace31a4ced1e8a47792f1bdb019_JaffaCakes118.exe
-
Size
542KB
-
MD5
0ec29ace31a4ced1e8a47792f1bdb019
-
SHA1
052f5b6f436b0ccf563da481d4de5dc10061432f
-
SHA256
fc0b0b0e0547233cccd421d1453308714afa1340e59c199dd8dbbb8f6d8c8217
-
SHA512
49dad111413ea9733934bd74bedccc9cd496d59cd8045a63fd1f6e1336e046d3ccdc821d141d0e840afbb49730d56c272fd24b7a9f68057390f43b15c135323a
-
SSDEEP
12288:pQuEjX3y5sdbaO+A2zRXuFDIOWtmYXmBq5BSPKYJxwLe:pL83y5JnzF8IOwf221YJSLe
Malware Config
Extracted
raccoon
1.8.1
5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4
-
url4cnc
https://t.me/agrybirdsgamerept
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2432-2-0x00000000002D0000-0x0000000000360000-memory.dmp family_raccoon_v1 behavioral1/memory/2432-3-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral1/memory/2432-5-0x00000000002D0000-0x0000000000360000-memory.dmp family_raccoon_v1 behavioral1/memory/2432-7-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral1/memory/2432-6-0x0000000000400000-0x0000000002BD0000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0ec29ace31a4ced1e8a47792f1bdb019_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ec29ace31a4ced1e8a47792f1bdb019_JaffaCakes118.exe