Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe
-
Size
645KB
-
MD5
43883777c9e6ca36de86c7db9f443376
-
SHA1
3572aac4fb15bb70b2ba0a524063e7ae72332692
-
SHA256
7a6a24f9bc07388b4a27beba0b2c25c4c7800d3e707e0959ff667b431722ad17
-
SHA512
2782f62f754e1f855260d81748805a851e72509ec483054e00fbd146bddcb5e60181263a05bab8c913790c759a9c7d3867b11fef7b8f12b0697cd8588a63bc52
-
SSDEEP
12288:25393whFOBBXfrftti0OjLvit/TGbqkXbyWYnxO3OtdqUtADTw:253uhFSfJtiDXiRwqkXbypnx9tbADTw
Malware Config
Extracted
raccoon
1.7.3
e2b58b2c24d80fcfd249021c5a21ac97c09e40a1
-
url4cnc
https://telete.in/mohibrainos
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral1/memory/2692-18-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral1/memory/2692-25-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral1/memory/2692-23-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral1/memory/2692-26-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral1/memory/2692-27-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 -
Executes dropped EXE 2 IoCs
pid Process 2684 mihost.exe 2692 mihost.exe -
Loads dropped DLL 3 IoCs
pid Process 2196 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 2196 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 2684 mihost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 2692 2684 mihost.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mihost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mihost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2684 mihost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2684 mihost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2104 2196 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2104 2196 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2104 2196 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2104 2196 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2684 2196 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 32 PID 2196 wrote to memory of 2684 2196 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 32 PID 2196 wrote to memory of 2684 2196 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 32 PID 2196 wrote to memory of 2684 2196 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 32 PID 2684 wrote to memory of 2692 2684 mihost.exe 33 PID 2684 wrote to memory of 2692 2684 mihost.exe 33 PID 2684 wrote to memory of 2692 2684 mihost.exe 33 PID 2684 wrote to memory of 2692 2684 mihost.exe 33 PID 2684 wrote to memory of 2692 2684 mihost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ""C:\Users\Admin\AppData\Local\Temp\mihost\KillDuplicate.cmd" "C:\Users\Admin\AppData\Local\Temp\mihost" "43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe""2⤵PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\mihost\mihost.exe"C:\Users\Admin\AppData\Local\Temp\mihost\mihost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\mihost\mihost.exe"C:\Users\Admin\AppData\Local\Temp\mihost\mihost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD5eb29c0d9cdec9593430ea87bd3e5a5f9
SHA175dbc7ae700f80a4d19480531ec01b56be57a835
SHA256367f6ba2d6f4014c4f599c1fe5596190f4573c53c8f55564044deada74bcc55c
SHA5128eb56eba6ecd419dc577adc587a6653c297bccd71cacbd34c9cd25888644e281ae7aa0293d886f71bba6fdc266af4a2512ac22113374610112b96a707dce3312