Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c590aa902b0bd7104fa9141a186a9b54a3d2c1343a4f154b011e9a3cd7b7e942.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c590aa902b0bd7104fa9141a186a9b54a3d2c1343a4f154b011e9a3cd7b7e942.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c590aa902b0bd7104fa9141a186a9b54a3d2c1343a4f154b011e9a3cd7b7e942.exe
-
Size
726.5MB
-
MD5
a597b84b83f16fbc9c9a36603f3939be
-
SHA1
72ea27b6e9e2c59b604f3d3c8eaff1e556c96a0a
-
SHA256
c590aa902b0bd7104fa9141a186a9b54a3d2c1343a4f154b011e9a3cd7b7e942
-
SHA512
952e3cb0b9da0e9d18b01d1fafa71c46d143b3cdbe6f3f9e49ab888fd68affcafa431bd9e71aef3de9a4c4b2d78b9a565687d13b552b0bc73c548eefa974e3dc
-
SSDEEP
98304:35xofbcy/4suvHO6qWSdQAVrVPo1sWtddOkHEirZ6fqdgIW0/wS6ap:35ejcTvHODr7hP2FjPkecI8yp
Malware Config
Extracted
raccoon
886058af451985da234e1a970b7e57a3
http://45.153.242.180/
-
user_agent
TakeMyPainBack
Signatures
-
Raccoon family
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3004 JaffaCakes118_c590aa902b0bd7104fa9141a186a9b54a3d2c1343a4f154b011e9a3cd7b7e942.exe 3004 JaffaCakes118_c590aa902b0bd7104fa9141a186a9b54a3d2c1343a4f154b011e9a3cd7b7e942.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c590aa902b0bd7104fa9141a186a9b54a3d2c1343a4f154b011e9a3cd7b7e942.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3004 JaffaCakes118_c590aa902b0bd7104fa9141a186a9b54a3d2c1343a4f154b011e9a3cd7b7e942.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c590aa902b0bd7104fa9141a186a9b54a3d2c1343a4f154b011e9a3cd7b7e942.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c590aa902b0bd7104fa9141a186a9b54a3d2c1343a4f154b011e9a3cd7b7e942.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3004