Analysis
-
max time kernel
93s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0ab3ded539e985e5cd5745b1f3c03a50280c1b3ffeb916e8e4f037ea74499388.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0ab3ded539e985e5cd5745b1f3c03a50280c1b3ffeb916e8e4f037ea74499388.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0ab3ded539e985e5cd5745b1f3c03a50280c1b3ffeb916e8e4f037ea74499388.exe
-
Size
730.8MB
-
MD5
243a3a6bf7890ca39908a0b1435fc554
-
SHA1
7cc4b371195359aeac6edcfe659218ecd833d6c3
-
SHA256
0ab3ded539e985e5cd5745b1f3c03a50280c1b3ffeb916e8e4f037ea74499388
-
SHA512
13cc7d7a432a5e074c13f8daa424974cb3fd447aeb9a1334780b4885188b6dbc6267dcf7e99e51dd132f307b73654535447b68212ec8d58556db807f8e9248c6
-
SSDEEP
196608:guDF5ssyfmKJu4fS8xqR5vlfbEpBerajBFuhKezpVR77esXabOm:zrsnrJBj0mpBera1FuhKWp+sKSm
Malware Config
Extracted
raccoon
20006ec55ea2d79e735051ae184a687c
http://45.9.74.170
http://77.73.134.43
-
user_agent
901785252112
Signatures
-
Raccoon Stealer V2 payload 3 IoCs
resource yara_rule behavioral2/memory/1712-1-0x0000000000400000-0x0000000001702000-memory.dmp family_raccoon_v2 behavioral2/memory/1712-5-0x0000000000400000-0x0000000001702000-memory.dmp family_raccoon_v2 behavioral2/memory/1712-6-0x0000000000400000-0x0000000001702000-memory.dmp family_raccoon_v2 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0ab3ded539e985e5cd5745b1f3c03a50280c1b3ffeb916e8e4f037ea74499388.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1712 JaffaCakes118_0ab3ded539e985e5cd5745b1f3c03a50280c1b3ffeb916e8e4f037ea74499388.exe 1712 JaffaCakes118_0ab3ded539e985e5cd5745b1f3c03a50280c1b3ffeb916e8e4f037ea74499388.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0ab3ded539e985e5cd5745b1f3c03a50280c1b3ffeb916e8e4f037ea74499388.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0ab3ded539e985e5cd5745b1f3c03a50280c1b3ffeb916e8e4f037ea74499388.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1712