Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2025, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d1ceb14f67c000f686aa0017c30bd54a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d1ceb14f67c000f686aa0017c30bd54a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d1ceb14f67c000f686aa0017c30bd54a.exe
-
Size
593KB
-
MD5
d1ceb14f67c000f686aa0017c30bd54a
-
SHA1
07f74f6f43bad4d58027a49d50b8e394029a25b1
-
SHA256
d89bf052a97ac09968b4832856b1d61c6b659ea74d1de47fec5b85e1a3a1bd9b
-
SHA512
39a03992fda156aaefd24698c9cd534899d9b3053d8d68da70bec563ae2d447ae26fc5850cc0586170791b708116b6f2e8fe77c7db013f69641ab56c55ce094d
-
SSDEEP
12288:4ifMkq1GyEAYfmZb1ib+RPJWRgEMR3uFySrSrDCPKrWSJh:4ibCGyEPYbMOMGEOuYDCPKt
Malware Config
Extracted
raccoon
723d14b565e8f39294f31f86b0ce56cdaee75105
-
url4cnc
http://telegatt.top/jdiamond13
http://telegka.top/jdiamond13
http://telegin.top/jdiamond13
https://t.me/jdiamond13
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
resource yara_rule behavioral2/memory/2032-2-0x0000000002510000-0x000000000259E000-memory.dmp family_raccoon_v1 behavioral2/memory/2032-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/2032-6-0x0000000002510000-0x000000000259E000-memory.dmp family_raccoon_v1 behavioral2/memory/2032-5-0x0000000000400000-0x00000000007C6000-memory.dmp family_raccoon_v1 behavioral2/memory/2032-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/2032-13-0x0000000000400000-0x00000000007C6000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d1ceb14f67c000f686aa0017c30bd54a.exe