Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
28477db32ba7f651b5319037a6900bf9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28477db32ba7f651b5319037a6900bf9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
28477db32ba7f651b5319037a6900bf9_JaffaCakes118.exe
-
Size
562KB
-
MD5
28477db32ba7f651b5319037a6900bf9
-
SHA1
17e89351ac8e24b82eea8ae9f6538714b0d014a1
-
SHA256
0a122a9c5b9ca7f66424aa64cdb7dc9c5d4093583e9afb89a26c6dd0f6587ea3
-
SHA512
707834add5fb39c8a9e3091e8ef867381729b11d8a48bcbd65c0e9ffa355ee33db222f37d2de539981da83b1c76b57a214663d039d14fdf5127797ff21630393
-
SSDEEP
12288:8Jg/7N47X+Ijsg84HFT18Q4/fhhBP6VXW6T2zcDd4q4e462:d7N4jh6bbByVRTL4FNb
Malware Config
Extracted
raccoon
93d3ccba4a3cbd5e268873fc1760b2335272e198
-
url4cnc
https://telete.in/opa4kiprivatem
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2884-2-0x0000000000BE0000-0x0000000000C6F000-memory.dmp family_raccoon_v1 behavioral2/memory/2884-3-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral2/memory/2884-5-0x0000000000BE0000-0x0000000000C6F000-memory.dmp family_raccoon_v1 behavioral2/memory/2884-7-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral2/memory/2884-6-0x0000000000400000-0x0000000000943000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
28477db32ba7f651b5319037a6900bf9_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28477db32ba7f651b5319037a6900bf9_JaffaCakes118.exe