Analysis Overview
SHA256
34808e9f103bf05f7fe5d4f585cb615cbe9156d04d96571cecc8ec86f95db4ce
Threat Level: Known bad
The file JaffaCakes118_946b09797151922fafdf58088b2ffa8e was found to be: Known bad.
Malicious Activity Summary
Raccoon
Raccoon Stealer V1 payload
Raccoon family
Suspicious use of SetThreadContext
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2025-01-08 07:59
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2025-01-08 07:59
Reported
2025-01-08 08:02
Platform
win7-20240903-en
Max time kernel
144s
Max time network
123s
Command Line
Signatures
Raccoon
Raccoon Stealer V1 payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Raccoon family
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2280 set thread context of 2904 | N/A | C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe | C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe
"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe"
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe
"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | telegatt.top | udp |
| US | 8.8.8.8:53 | telegka.top | udp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 104.155.138.21:80 | telegka.top | tcp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | telegin.top | udp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
Files
memory/2280-2-0x0000000000860000-0x00000000008DB000-memory.dmp
memory/2280-1-0x00000000002F0000-0x00000000003F0000-memory.dmp
memory/2904-5-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/2904-7-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/2904-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2904-9-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/2904-11-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/2904-12-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/2904-13-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/2904-14-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/2904-26-0x0000000000400000-0x00000000004EB000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2025-01-08 07:59
Reported
2025-01-08 08:02
Platform
win10v2004-20241007-en
Max time kernel
142s
Max time network
148s
Command Line
Signatures
Raccoon
Raccoon Stealer V1 payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Raccoon family
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1608 set thread context of 3832 | N/A | C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe | C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe
"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe"
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe
"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946b09797151922fafdf58088b2ffa8e.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.130.81.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | telegatt.top | udp |
| US | 8.8.8.8:53 | telegatt.top | udp |
| US | 8.8.8.8:53 | telegatt.top | udp |
| US | 8.8.8.8:53 | telegka.top | udp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | 183.223.178.107.in-addr.arpa | udp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | 20.49.80.91.in-addr.arpa | udp |
| US | 107.178.223.183:80 | telegka.top | tcp |
| US | 8.8.8.8:53 | telegin.top | udp |
| US | 8.8.8.8:53 | telegin.top | udp |
| US | 8.8.8.8:53 | telegin.top | udp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| US | 8.8.8.8:53 | 99.167.154.149.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.130.81.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
Files
memory/1608-1-0x0000000000AC0000-0x0000000000BC0000-memory.dmp
memory/1608-2-0x0000000002560000-0x00000000025DB000-memory.dmp
memory/3832-3-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/3832-5-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/3832-4-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/3832-7-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/3832-10-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/3832-9-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/3832-11-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/3832-12-0x0000000000400000-0x00000000004EB000-memory.dmp
memory/3832-20-0x0000000000400000-0x00000000004EB000-memory.dmp