Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 14:05

General

  • Target

    41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe

  • Size

    15.8MB

  • MD5

    41c38b28a965f10261a320ec88c7adc0

  • SHA1

    f633611416eacf26ca20291e672a954a186220cd

  • SHA256

    42ca73a2f64b86c9e59cc795eaf28450bdfd1149a35b052e2a8baf1b47e82204

  • SHA512

    5b8b7fb27e3f5e904399f8a9a063cfadb5085db0e2f68b0d58a8cd9050896651c4627d393039259b09cfd4fb3cfb1ceef4728e317e18d2ba19bc771399804687

  • SSDEEP

    393216:i6eS1UH9VJcP/hDcSWodYkg7S1e1uBFBecboH86C:i6eS1cVJcXcBMiuFBemoH8L

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 9 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Roaming\Outbreak\Pigeon_39.exe
      "C:\Users\Admin\AppData\Roaming\Outbreak\Pigeon_39.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Drops startup file
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Users\Admin\AppData\Roaming\Realtek Sound Blaster\RealtekSb.exe
        "C:\Users\Admin\AppData\Roaming\Realtek Sound Blaster\RealtekSb.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        PID:2292
    • C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe
      "C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc install MicrosoftDefenderBackup C:\ProgramData\Microsoft\MicrosoftDefender\WUDHost.exe
        3⤵
          PID:2260
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc start MicrosoftDefenderBackup
          3⤵
            PID:2940
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc set MicrosoftDefenderBackup start SERVICE_AUTO_START && mwc start MicrosoftDefenderBackup
            3⤵
              PID:3000
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c ping -n 5 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1900
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 5 localhost
                4⤵
                • Runs ping.exe
                PID:1056
          • C:\Users\Admin\AppData\Roaming\Software\Crew_95.exe
            "C:\Users\Admin\AppData\Roaming\Software\Crew_95.exe"
            2⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:2520

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Defense Evasion

        Virtualization/Sandbox Evasion

        2
        T1497

        Subvert Trust Controls

        1
        T1553

        Install Root Certificate

        1
        T1553.004

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        3
        T1012

        Virtualization/Sandbox Evasion

        2
        T1497

        System Information Discovery

        2
        T1082

        Remote System Discovery

        1
        T1018

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Software\Crew_95.exe
          Filesize

          4.3MB

          MD5

          ef9aa9009c8df44bb806f66b8e367bf7

          SHA1

          9fdcbf944c3f6bdabe66d1d8caa058e167baa14b

          SHA256

          459d0ea5dc8c44e62020aff6016cf0a4495e217e1892bda8aaf8f2a9187d4612

          SHA512

          99e744363ac69343a394a13c1c219e9167dbf892150abd0d840f78a0d9566ecb340827d8a67a0d32365eca209c723e3d370a715151be74641dbea2a09e35eac2

        • C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe
          Filesize

          4.5MB

          MD5

          0881095412775a91dcaab9b0ff5325e4

          SHA1

          6b8001b963c6120ebfbc303f9d9e42eb7b935dba

          SHA256

          a801f1c92530887b30c21fcd5fbfe284446a918441a9ba62bb98ff23772e470d

          SHA512

          0111e64ef2b1b133f0da60e2e9885a4bc65f4c5f43cc01abe664cc4ff9202f94fc581943b27fd967076ae9d3ebe965a0a0c06842d725649bc8536f7c4d8ff521

        • \Users\Admin\AppData\Local\Temp\nso8B70.tmp\System.dll
          Filesize

          11KB

          MD5

          0063d48afe5a0cdc02833145667b6641

          SHA1

          e7eb614805d183ecb1127c62decb1a6be1b4f7a8

          SHA256

          ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7

          SHA512

          71cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0

        • \Users\Admin\AppData\Roaming\Outbreak\Pigeon_39.exe
          Filesize

          6.8MB

          MD5

          f7958823d5a3c0a2df7974adde4028d0

          SHA1

          bb4e28ce33d1d1346c9916593d2760596eec0cc2

          SHA256

          72a310904f5c29c586eceff7a2442dc50e82c5a0673ac62e07c793333803f0e5

          SHA512

          5d65bf146d76f0d24599e95d6b222125d717bf6a94c58034cb09a96380b92b6a672a54987acebca83ba1f9dc78ab1947fa3c9cc5856f08a0042673b78fcf9171

        • memory/1368-11-0x0000000003080000-0x0000000003CC6000-memory.dmp
          Filesize

          12.3MB

        • memory/1368-22-0x0000000003080000-0x0000000003AF7000-memory.dmp
          Filesize

          10.5MB

        • memory/2292-59-0x0000000000DE0000-0x0000000001A26000-memory.dmp
          Filesize

          12.3MB

        • memory/2520-58-0x00000000011B0000-0x0000000001BA8000-memory.dmp
          Filesize

          10.0MB

        • memory/2520-44-0x0000000001BB0000-0x00000000025A8000-memory.dmp
          Filesize

          10.0MB

        • memory/2520-62-0x0000000001BB0000-0x00000000025A8000-memory.dmp
          Filesize

          10.0MB

        • memory/2520-49-0x0000000001BB0000-0x00000000025A8000-memory.dmp
          Filesize

          10.0MB

        • memory/2520-45-0x0000000001BB0000-0x00000000025A8000-memory.dmp
          Filesize

          10.0MB

        • memory/2520-43-0x00000000011B0000-0x0000000001BA8000-memory.dmp
          Filesize

          10.0MB

        • memory/2628-57-0x0000000000220000-0x0000000000C97000-memory.dmp
          Filesize

          10.5MB

        • memory/2628-23-0x0000000000220000-0x0000000000C97000-memory.dmp
          Filesize

          10.5MB

        • memory/2628-70-0x0000000000220000-0x0000000000C97000-memory.dmp
          Filesize

          10.5MB

        • memory/2628-82-0x0000000000220000-0x0000000000C97000-memory.dmp
          Filesize

          10.5MB

        • memory/2744-35-0x0000000000B00000-0x0000000001746000-memory.dmp
          Filesize

          12.3MB

        • memory/2744-37-0x0000000000B00000-0x0000000001746000-memory.dmp
          Filesize

          12.3MB

        • memory/2744-50-0x0000000000210000-0x0000000000220000-memory.dmp
          Filesize

          64KB

        • memory/2744-56-0x0000000000B00000-0x0000000001746000-memory.dmp
          Filesize

          12.3MB

        • memory/2744-25-0x0000000000B01000-0x0000000000B10000-memory.dmp
          Filesize

          60KB

        • memory/2744-24-0x0000000077D50000-0x0000000077D52000-memory.dmp
          Filesize

          8KB

        • memory/2744-13-0x0000000000B00000-0x0000000001746000-memory.dmp
          Filesize

          12.3MB