Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8279812ab08bff33c9cc0286bdd17a440964f98aedce3d5c184527e9d1a97fdc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8279812ab08bff33c9cc0286bdd17a440964f98aedce3d5c184527e9d1a97fdc.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8279812ab08bff33c9cc0286bdd17a440964f98aedce3d5c184527e9d1a97fdc.exe
-
Size
730.3MB
-
MD5
85a38f0f83dcd71f4024fa8f4bf9410a
-
SHA1
263d357e11319518fa9279005430fadf10ae3eb0
-
SHA256
8279812ab08bff33c9cc0286bdd17a440964f98aedce3d5c184527e9d1a97fdc
-
SHA512
3eea7c9bb2bb2af9d5a4e05f7e30e92f7172cd1787685a1d62515f0be9de674174dc543bb16e7da80e1fb09bb2d2e18463f0f61fb5a9c7f99276da698dd87ee8
-
SSDEEP
196608:tEZSGTKbYGgxc13v4BNIP1vYyXYox8YPZFxhiN779hiDmwg/EVdQ0n/:te9TKbYGgxCv4BN4DXXPC7iDm/cQU/
Malware Config
Extracted
raccoon
467a953db8cf896cec6946f6144f8158
http://79.137.206.158/
http://79.137.248.245/
-
user_agent
B1D3N_RIM_MY_ASS
Signatures
-
Raccoon Stealer V2 payload 2 IoCs
resource yara_rule behavioral2/memory/2384-10-0x0000000000400000-0x00000000015C3000-memory.dmp family_raccoon_v2 behavioral2/memory/2384-11-0x0000000000400000-0x00000000015C3000-memory.dmp family_raccoon_v2 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8279812ab08bff33c9cc0286bdd17a440964f98aedce3d5c184527e9d1a97fdc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2384 JaffaCakes118_8279812ab08bff33c9cc0286bdd17a440964f98aedce3d5c184527e9d1a97fdc.exe 2384 JaffaCakes118_8279812ab08bff33c9cc0286bdd17a440964f98aedce3d5c184527e9d1a97fdc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8279812ab08bff33c9cc0286bdd17a440964f98aedce3d5c184527e9d1a97fdc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8279812ab08bff33c9cc0286bdd17a440964f98aedce3d5c184527e9d1a97fdc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2384