Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
a5015ed7d25d74ca1d0f26a9b7e5eb86_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a5015ed7d25d74ca1d0f26a9b7e5eb86_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a5015ed7d25d74ca1d0f26a9b7e5eb86_JaffaCakes118.exe
-
Size
561KB
-
MD5
a5015ed7d25d74ca1d0f26a9b7e5eb86
-
SHA1
4ef99ce5ad010841ded00b3bccba99fc0a6b0881
-
SHA256
32eb922eb910e3baa92dee051fcf8b3d93d597a8f83aa471c3501a3283459e7f
-
SHA512
38aab68854399263d46dc35f16cf5675fc77ee588649c3954b2705f0012db13a8c88ae97145950f57537f64958c9f85e28807bd5463637fbb0ba63be2eaaa349
-
SSDEEP
12288:XVhSdiZ0jHDsGdZUnX/M/Jy/YT3Toqx6DGL:3Ww0jkXUJmi4qL
Malware Config
Extracted
raccoon
1.7.3
619c26986c79d067eda0bf8e57955aebe9af0fa7
-
url4cnc
https://telete.in/forkmaster123
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral2/memory/1668-2-0x0000000000A40000-0x0000000000AD3000-memory.dmp family_raccoon_v1 behavioral2/memory/1668-3-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/1668-5-0x0000000000A40000-0x0000000000AD3000-memory.dmp family_raccoon_v1 behavioral2/memory/1668-7-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/1668-6-0x0000000000400000-0x0000000000943000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5015ed7d25d74ca1d0f26a9b7e5eb86_JaffaCakes118.exe