Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
ab7bbb96c5f98bf3e72a51b0eab1d407_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab7bbb96c5f98bf3e72a51b0eab1d407_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ab7bbb96c5f98bf3e72a51b0eab1d407_JaffaCakes118.exe
-
Size
570KB
-
MD5
ab7bbb96c5f98bf3e72a51b0eab1d407
-
SHA1
f88ccd6c37b55a3691fb9ba734fd7291ac23f50b
-
SHA256
3bef0f6d01a792fc9ed1c780d977ed9940cbf68b29c1754b74eb596c83a44c05
-
SHA512
d0aad1005b1d63bf984c132ce8194c1749f78de44dd397629af907cb549185a27d50b664a320678a79487fefa5fe8f36552ce3b0a90346d67256f5975d58f399
-
SSDEEP
12288:Ez1Nq20aFkBV12AndnMYqzn3N6dQibpZOVtUhIzI:gnb0aSY3NEQEuDCIzI
Malware Config
Extracted
raccoon
1.7.3
619c26986c79d067eda0bf8e57955aebe9af0fa7
-
url4cnc
https://telete.in/forkmaster123
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1712-2-0x0000000000950000-0x00000000009E3000-memory.dmp family_raccoon_v1 behavioral2/memory/1712-3-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/1712-5-0x0000000000950000-0x00000000009E3000-memory.dmp family_raccoon_v1 behavioral2/memory/1712-7-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/1712-6-0x0000000000400000-0x0000000000944000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ab7bbb96c5f98bf3e72a51b0eab1d407_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab7bbb96c5f98bf3e72a51b0eab1d407_JaffaCakes118.exe