Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
3d7504da78e09704ec8902f63d156c4d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d7504da78e09704ec8902f63d156c4d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d7504da78e09704ec8902f63d156c4d_JaffaCakes118.exe
-
Size
460KB
-
MD5
3d7504da78e09704ec8902f63d156c4d
-
SHA1
c35451ab680bf6ed381f39e33d25aa39e3aa1bf6
-
SHA256
da6edc1276fab7bfa04b08b6dfcea00e185aa8cefe53c2b1d11529067871ab44
-
SHA512
1235d8d70bf45fca529ec772fd58c65bd3964590a081eecfeeac2b56e879b4c5b70888bf7e01cc8c6250408d24fc8100e490429e173087dcecaeaf939dc4cc38
-
SSDEEP
12288:T1u2U2mVCv9V0uFLAmZTp9zX7zmnGmDV/emaHONHGi:c2eVYVPF9Zl9r2G8Vnaemi
Malware Config
Extracted
raccoon
93d3ccba4a3cbd5e268873fc1760b2335272e198
-
url4cnc
https://telete.in/opa4kiprivatem
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral2/memory/2664-2-0x0000000004A50000-0x0000000004ADF000-memory.dmp family_raccoon_v1 behavioral2/memory/2664-3-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral2/memory/2664-5-0x0000000004A50000-0x0000000004ADF000-memory.dmp family_raccoon_v1 behavioral2/memory/2664-7-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral2/memory/2664-6-0x0000000000400000-0x0000000002D01000-memory.dmp family_raccoon_v1 -
Program crash 6 IoCs
pid pid_target Process procid_target 3496 2664 WerFault.exe 84 3628 2664 WerFault.exe 84 4696 2664 WerFault.exe 84 3368 2664 WerFault.exe 84 3436 2664 WerFault.exe 84 4436 2664 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d7504da78e09704ec8902f63d156c4d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d7504da78e09704ec8902f63d156c4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d7504da78e09704ec8902f63d156c4d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 7402⤵
- Program crash
PID:3496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 7762⤵
- Program crash
PID:3628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 8722⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 8962⤵
- Program crash
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 11562⤵
- Program crash
PID:3436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 12282⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2664 -ip 26641⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2664 -ip 26641⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2664 -ip 26641⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2664 -ip 26641⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2664 -ip 26641⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2664 -ip 26641⤵PID:2116