Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe
-
Size
650.2MB
-
MD5
baeb3316e444a69b02f39ef5a87b54a0
-
SHA1
beff9fbc07e2c90d3aef8ca7e89f738980c88e4a
-
SHA256
3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8
-
SHA512
03d97e677bd37935b24c6d495ebe9008f4cbbc447bcf2de50d164ae06d40bfd33e26d68fb5f5336a1f87507794b3fc0bd913531148fdd664e9fdd3702151e80c
-
SSDEEP
3072:80rSPM1VrG9kEV8Ow7uhWuYRjd5fHlWbrJtVA:8L4TpuhWuY9dFMbrTVA
Malware Config
Extracted
raccoon
2bdc8b70f9d4d48bc949e7397bff9ceb
http://168.100.11.23/
-
user_agent
mozzzzzzzzzzz
Signatures
-
Raccoon family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1524 set thread context of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2148 2932 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 1524 wrote to memory of 2932 1524 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 31 PID 2932 wrote to memory of 2148 2932 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 32 PID 2932 wrote to memory of 2148 2932 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 32 PID 2932 wrote to memory of 2148 2932 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 32 PID 2932 wrote to memory of 2148 2932 JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d7b02e62a72a648503dbee21204b72b22ec6ef39f574c81dc5a072c4f8283a8.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 363⤵
- Program crash
PID:2148
-
-