Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
614ecf4d0a5f0d42655fedf09b82813d_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
614ecf4d0a5f0d42655fedf09b82813d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
614ecf4d0a5f0d42655fedf09b82813d_JaffaCakes118.exe
-
Size
462KB
-
MD5
614ecf4d0a5f0d42655fedf09b82813d
-
SHA1
c5b3e85f19ef84f45001e11af2f3bdc5454b6b16
-
SHA256
b99ac985c91f5a5e0c2ab8c5b92cb644cea66cb3336c2b6665274e78151cc372
-
SHA512
57eda7be4c9e80147e58d4c1712596800d8597810dfd1548faf387bac108a4bd5a19fad1a1a52f15ffb326babb544cd5c37e85f824ad91599261ee451b8593cd
-
SSDEEP
6144:XwbL+OU1hFakiHQxRgdaSdFGwh5+HvfMlt2g8uuMFD144IZNz:XaC1HPoaS3GI5IvfMX2Nj4D6h
Malware Config
Extracted
raccoon
1.7.3
2ca2376c561d1af7f8b9e6f3256b06220a3db187
-
url4cnc
https://telete.in/johnyes13
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1456-2-0x00000000049F0000-0x0000000004A83000-memory.dmp family_raccoon_v1 behavioral2/memory/1456-3-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/1456-6-0x00000000049F0000-0x0000000004A83000-memory.dmp family_raccoon_v1 behavioral2/memory/1456-5-0x0000000000400000-0x0000000002CAB000-memory.dmp family_raccoon_v1 behavioral2/memory/1456-7-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
614ecf4d0a5f0d42655fedf09b82813d_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 614ecf4d0a5f0d42655fedf09b82813d_JaffaCakes118.exe