Resubmissions
30-11-2024 13:11
241130-qfbnasyper 1006-10-2024 15:16
241006-snzffaveme 1024-08-2024 15:38
240824-s231sayemk 1024-08-2024 05:47
240824-ghd2rsxfrq 10Analysis
-
max time kernel
590s -
max time network
375s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe
-
Size
541KB
-
MD5
be01323b80fba9b067b964f32fb09b79
-
SHA1
3cab41e92e0c6b2cc63e53f7e55b22db566d000a
-
SHA256
1e89e268686b120ae6e58ebfc87c5a532d227a54c35bc3b01ed1b992503f64e2
-
SHA512
73fa1a25fa7fccaa874d0f5e450870d93e1710991057e3af423b6b7089f30b046959e7f6f85a0e2c53b6d936b91141b4b33dcbaa676b9489e98c6bdd8d0df871
-
SSDEEP
12288:HoHoQ2Akjmwt0+jFHCQ3cnXJ9sMuzxp6L:HOoI2mwt0+jd2nsL36L
Malware Config
Extracted
raccoon
1.8.2
e672747afc67feb221ca60f8fc9e03adcf10f038
-
url4cnc
http://teletop.top/youyouhell0world
http://teleta.top/youyouhell0world
https://t.me/youyouhell0world
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2224-2-0x0000000000320000-0x00000000003AE000-memory.dmp family_raccoon_v1 behavioral1/memory/2224-3-0x0000000000400000-0x0000000000490000-memory.dmp family_raccoon_v1 behavioral1/memory/2224-5-0x0000000000400000-0x0000000000494000-memory.dmp family_raccoon_v1 behavioral1/memory/2224-6-0x0000000000320000-0x00000000003AE000-memory.dmp family_raccoon_v1 behavioral1/memory/2224-7-0x0000000000400000-0x0000000000490000-memory.dmp family_raccoon_v1 behavioral1/memory/2224-44-0x0000000000400000-0x0000000000494000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe