Analysis
-
max time kernel
12s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9484a44f677fc8ebd6dbbb9480dc039f3e799ca9f2381c580e1e3914b2b919f7.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9484a44f677fc8ebd6dbbb9480dc039f3e799ca9f2381c580e1e3914b2b919f7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9484a44f677fc8ebd6dbbb9480dc039f3e799ca9f2381c580e1e3914b2b919f7.exe
-
Size
730.0MB
-
MD5
06c4093950b292b57084643fdbef20d8
-
SHA1
e9cfc6ef108e0e6ab1f33060a92bf91debd03bce
-
SHA256
9484a44f677fc8ebd6dbbb9480dc039f3e799ca9f2381c580e1e3914b2b919f7
-
SHA512
9b2d8b257982fc745fa8b5e906844ab54a66daf66f03f6482cec3fa584657270fd285ab15b6c9df19e44c29e52c7939c4d50e4de5683e9da0f6e886ce3eb389d
-
SSDEEP
196608:Dqkq7xWxHjSwvcWgSNXqAK/9CHeB5DiWSzvkICfH8HryeuqKI:dxDSJQolfnDiW66cHzh
Malware Config
Extracted
raccoon
f49765d62e02586d0fe162b5d3a934ad
http://5.75.159.229/
http://212.113.119.153/
http://78.153.130.123/
http://212.113.119.35/
-
user_agent
B1D3N_RIM_MY_ASS
Signatures
-
Raccoon Stealer V2 payload 4 IoCs
resource yara_rule behavioral1/memory/1760-5-0x0000000000400000-0x0000000001518000-memory.dmp family_raccoon_v2 behavioral1/memory/1760-8-0x0000000000400000-0x0000000001518000-memory.dmp family_raccoon_v2 behavioral1/memory/1760-9-0x0000000000400000-0x0000000001518000-memory.dmp family_raccoon_v2 behavioral1/memory/1760-10-0x0000000000400000-0x0000000001518000-memory.dmp family_raccoon_v2 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9484a44f677fc8ebd6dbbb9480dc039f3e799ca9f2381c580e1e3914b2b919f7.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1760 JaffaCakes118_9484a44f677fc8ebd6dbbb9480dc039f3e799ca9f2381c580e1e3914b2b919f7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9484a44f677fc8ebd6dbbb9480dc039f3e799ca9f2381c580e1e3914b2b919f7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9484a44f677fc8ebd6dbbb9480dc039f3e799ca9f2381c580e1e3914b2b919f7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1760