Resubmissions
30-11-2024 13:11
241130-qfbnasyper 1006-10-2024 15:16
241006-snzffaveme 1024-08-2024 15:38
240824-s231sayemk 1024-08-2024 05:47
240824-ghd2rsxfrq 10Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe
-
Size
541KB
-
MD5
be01323b80fba9b067b964f32fb09b79
-
SHA1
3cab41e92e0c6b2cc63e53f7e55b22db566d000a
-
SHA256
1e89e268686b120ae6e58ebfc87c5a532d227a54c35bc3b01ed1b992503f64e2
-
SHA512
73fa1a25fa7fccaa874d0f5e450870d93e1710991057e3af423b6b7089f30b046959e7f6f85a0e2c53b6d936b91141b4b33dcbaa676b9489e98c6bdd8d0df871
-
SSDEEP
12288:HoHoQ2Akjmwt0+jFHCQ3cnXJ9sMuzxp6L:HOoI2mwt0+jd2nsL36L
Malware Config
Extracted
raccoon
1.8.2
e672747afc67feb221ca60f8fc9e03adcf10f038
-
url4cnc
http://teletop.top/youyouhell0world
http://teleta.top/youyouhell0world
https://t.me/youyouhell0world
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2372-2-0x00000000002F0000-0x000000000037E000-memory.dmp family_raccoon_v1 behavioral1/memory/2372-3-0x0000000000400000-0x0000000000490000-memory.dmp family_raccoon_v1 behavioral1/memory/2372-6-0x00000000002F0000-0x000000000037E000-memory.dmp family_raccoon_v1 behavioral1/memory/2372-5-0x0000000000400000-0x0000000000494000-memory.dmp family_raccoon_v1 behavioral1/memory/2372-7-0x0000000000400000-0x0000000000490000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
rundll32.exedescription pid Process Token: SeSystemtimePrivilege 2848 rundll32.exe Token: SeSystemtimePrivilege 2848 rundll32.exe Token: SeSystemtimePrivilege 2848 rundll32.exe Token: SeSystemtimePrivilege 2848 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
control.exedescription pid Process procid_target PID 2096 wrote to memory of 2848 2096 control.exe 32 PID 2096 wrote to memory of 2848 2096 control.exe 32 PID 2096 wrote to memory of 2848 2096 control.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2372
-
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" "C:\Windows\system32\timedate.cpl",1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\timedate.cpl",2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848
-