Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe
-
Size
645KB
-
MD5
43883777c9e6ca36de86c7db9f443376
-
SHA1
3572aac4fb15bb70b2ba0a524063e7ae72332692
-
SHA256
7a6a24f9bc07388b4a27beba0b2c25c4c7800d3e707e0959ff667b431722ad17
-
SHA512
2782f62f754e1f855260d81748805a851e72509ec483054e00fbd146bddcb5e60181263a05bab8c913790c759a9c7d3867b11fef7b8f12b0697cd8588a63bc52
-
SSDEEP
12288:25393whFOBBXfrftti0OjLvit/TGbqkXbyWYnxO3OtdqUtADTw:253uhFSfJtiDXiRwqkXbypnx9tbADTw
Malware Config
Extracted
raccoon
1.7.3
e2b58b2c24d80fcfd249021c5a21ac97c09e40a1
-
url4cnc
https://telete.in/mohibrainos
Signatures
-
Raccoon Stealer V1 payload 7 IoCs
resource yara_rule behavioral2/memory/2828-19-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral2/memory/2828-21-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral2/memory/2828-22-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral2/memory/2828-24-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 behavioral2/memory/2828-25-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral2/memory/2828-29-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral2/memory/2828-30-0x0000000000400000-0x0000000000496000-memory.dmp family_raccoon_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 5112 mihost.exe 2828 mihost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5112 set thread context of 2828 5112 mihost.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mihost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mihost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5112 mihost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5112 mihost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4808 3400 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 85 PID 3400 wrote to memory of 4808 3400 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 85 PID 3400 wrote to memory of 5112 3400 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 87 PID 3400 wrote to memory of 5112 3400 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 87 PID 3400 wrote to memory of 5112 3400 43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe 87 PID 5112 wrote to memory of 2828 5112 mihost.exe 100 PID 5112 wrote to memory of 2828 5112 mihost.exe 100 PID 5112 wrote to memory of 2828 5112 mihost.exe 100 PID 5112 wrote to memory of 2828 5112 mihost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ""C:\Users\Admin\AppData\Local\Temp\mihost\KillDuplicate.cmd" "C:\Users\Admin\AppData\Local\Temp\mihost" "43883777c9e6ca36de86c7db9f443376_JaffaCakes118.exe""2⤵PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\mihost\mihost.exe"C:\Users\Admin\AppData\Local\Temp\mihost\mihost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\mihost\mihost.exe"C:\Users\Admin\AppData\Local\Temp\mihost\mihost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD5eb29c0d9cdec9593430ea87bd3e5a5f9
SHA175dbc7ae700f80a4d19480531ec01b56be57a835
SHA256367f6ba2d6f4014c4f599c1fe5596190f4573c53c8f55564044deada74bcc55c
SHA5128eb56eba6ecd419dc577adc587a6653c297bccd71cacbd34c9cd25888644e281ae7aa0293d886f71bba6fdc266af4a2512ac22113374610112b96a707dce3312