Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/12/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
f41922ec045ae9d97585118ed080cf0f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f41922ec045ae9d97585118ed080cf0f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f41922ec045ae9d97585118ed080cf0f_JaffaCakes118.exe
-
Size
477KB
-
MD5
f41922ec045ae9d97585118ed080cf0f
-
SHA1
b0c644a6bba3c9402dcd77eb9c2fec30542fc38d
-
SHA256
4b8c4a8eac028219e9061dc6b6cf7042526a56e13c8df7ddbd301b9854b7b19a
-
SHA512
89ee1251b8587f748bf0ae5ed011d231835370802532604b8ffbceba4352b9992509f53b14e034a4223f98bb0a4151a2e47ca0a0cc1d6bddc17f355747499c15
-
SSDEEP
6144:4LLJLjTP1hhkWXQBi2W6aWLTLkglQsT3kOGu/ugLSLYrziboCMk/Qnu9zrRgpS6y:4LtHxAVlNPjGumg0HUnWR1GY
Malware Config
Extracted
raccoon
1.7.3
8a89272858125c31016bc130ad19557408b8bbe4
-
url4cnc
https://telete.in/jjbadb0y
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral1/memory/2204-2-0x0000000000220000-0x00000000002B3000-memory.dmp family_raccoon_v1 behavioral1/memory/2204-3-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2204-5-0x0000000000220000-0x00000000002B3000-memory.dmp family_raccoon_v1 behavioral1/memory/2204-7-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2204-6-0x0000000000400000-0x0000000002CAF000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f41922ec045ae9d97585118ed080cf0f_JaffaCakes118.exe