Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
54762bd38a71039a55ac90781ef68432_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54762bd38a71039a55ac90781ef68432_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
54762bd38a71039a55ac90781ef68432_JaffaCakes118.exe
-
Size
543KB
-
MD5
54762bd38a71039a55ac90781ef68432
-
SHA1
05453252fafea42186230603a12d73c286bbe8a2
-
SHA256
3e64270945ac865803314ae3bb7ab8b854e8f251719bad443f2189c619e0b4b7
-
SHA512
57a7a0cf09a488647d1891b457f5f59e27ac2d3becc0fa564e21958c77404e94e79796f56e349bfc0ab1aa284c9b6436a55ab20ee96161b4e0e25fc3792120f7
-
SSDEEP
12288:K1JEkK3AretDXpaIIz9p2840KI+oaBf2AZv3u:KvQ3AryA/28UzBf3Zve
Malware Config
Extracted
raccoon
1.8.1
5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4
-
url4cnc
https://t.me/agrybirdsgamerept
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/220-2-0x0000000002D50000-0x0000000002DE0000-memory.dmp family_raccoon_v1 behavioral2/memory/220-3-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral2/memory/220-5-0x0000000002D50000-0x0000000002DE0000-memory.dmp family_raccoon_v1 behavioral2/memory/220-7-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon_v1 behavioral2/memory/220-6-0x0000000000400000-0x0000000002BD0000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
54762bd38a71039a55ac90781ef68432_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54762bd38a71039a55ac90781ef68432_JaffaCakes118.exe