Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
ea78f64a65ade7f40a56f106b666092d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea78f64a65ade7f40a56f106b666092d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ea78f64a65ade7f40a56f106b666092d_JaffaCakes118.exe
-
Size
496KB
-
MD5
ea78f64a65ade7f40a56f106b666092d
-
SHA1
7aeb248f2a5dafa1a7a67516a955f255d7190184
-
SHA256
9bc7005b8ede7f8de8210326af0a50af7329ff548093b288a78e1447da20c91a
-
SHA512
4df1e05b5ef77715de329a8d0dbd4ee6f0a767a16ccd7f01fa9624898eec948607959e7663be96fa9ca67c00d0258ffc1f2f5c262b98de44f7c22ff50b9d6dea
-
SSDEEP
12288:QFXx3LOtgWmYYz3U36oeg8f0bs0oMZvKRjOY:QFhc2Jjf0wDoY
Malware Config
Extracted
raccoon
1.7.3
8a89272858125c31016bc130ad19557408b8bbe4
-
url4cnc
https://telete.in/jjbadb0y
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral1/memory/2668-2-0x0000000002FB0000-0x0000000003043000-memory.dmp family_raccoon_v1 behavioral1/memory/2668-3-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2668-5-0x0000000002FB0000-0x0000000003043000-memory.dmp family_raccoon_v1 behavioral1/memory/2668-7-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2668-6-0x0000000000400000-0x0000000002CB2000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea78f64a65ade7f40a56f106b666092d_JaffaCakes118.exe