Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
f0b68ddc0bef98205b22b8bccec05436_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f0b68ddc0bef98205b22b8bccec05436_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f0b68ddc0bef98205b22b8bccec05436_JaffaCakes118.exe
-
Size
468KB
-
MD5
f0b68ddc0bef98205b22b8bccec05436
-
SHA1
87a8ca516fbbb6a34bb8f4dd5a6f3930b64e90c9
-
SHA256
adf56d5514f9ff609943983010d3fc67ac0b29d5f92ac9adc25bafba79bad88a
-
SHA512
4b052079bcded8571e589cf945430fd0607fa7a2d97d066ee1c60f96787abb2517e6c85ea87f61f2936fdd1e016d7a00a8ba0a5d552d2f13e9808bc2e6a30e7c
-
SSDEEP
6144:j2nWLbsyDsyW2EGKo1Y4rA6VUzGm5UiWSA1y7UEdRa0sORORDCi:uW8y4yWx8j86V2GmrWSKuUESOC2i
Malware Config
Extracted
raccoon
93d3ccba4a3cbd5e268873fc1760b2335272e198
-
url4cnc
https://telete.in/opa4kiprivatem
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral2/memory/1096-2-0x0000000002EB0000-0x0000000002F3F000-memory.dmp family_raccoon_v1 behavioral2/memory/1096-3-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral2/memory/1096-5-0x0000000002EB0000-0x0000000002F3F000-memory.dmp family_raccoon_v1 behavioral2/memory/1096-7-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral2/memory/1096-6-0x0000000000400000-0x0000000002D02000-memory.dmp family_raccoon_v1 -
Raccoon family
-
Program crash 6 IoCs
pid pid_target Process procid_target 4488 1096 WerFault.exe 82 984 1096 WerFault.exe 82 1564 1096 WerFault.exe 82 1076 1096 WerFault.exe 82 5100 1096 WerFault.exe 82 1852 1096 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0b68ddc0bef98205b22b8bccec05436_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0b68ddc0bef98205b22b8bccec05436_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0b68ddc0bef98205b22b8bccec05436_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 7402⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 7602⤵
- Program crash
PID:984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 8722⤵
- Program crash
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 9122⤵
- Program crash
PID:1076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 9122⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 12122⤵
- Program crash
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1096 -ip 10961⤵PID:2564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1096 -ip 10961⤵PID:2028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1096 -ip 10961⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1096 -ip 10961⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1096 -ip 10961⤵PID:544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1096 -ip 10961⤵PID:4804