Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 14:05

General

  • Target

    41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe

  • Size

    15.8MB

  • MD5

    41c38b28a965f10261a320ec88c7adc0

  • SHA1

    f633611416eacf26ca20291e672a954a186220cd

  • SHA256

    42ca73a2f64b86c9e59cc795eaf28450bdfd1149a35b052e2a8baf1b47e82204

  • SHA512

    5b8b7fb27e3f5e904399f8a9a063cfadb5085db0e2f68b0d58a8cd9050896651c4627d393039259b09cfd4fb3cfb1ceef4728e317e18d2ba19bc771399804687

  • SSDEEP

    393216:i6eS1UH9VJcP/hDcSWodYkg7S1e1uBFBecboH86C:i6eS1cVJcXcBMiuFBemoH8L

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Roaming\Outbreak\Pigeon_39.exe
      "C:\Users\Admin\AppData\Roaming\Outbreak\Pigeon_39.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Drops startup file
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Roaming\Realtek Sound Blaster\RealtekSb.exe
        "C:\Users\Admin\AppData\Roaming\Realtek Sound Blaster\RealtekSb.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        PID:3848
    • C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe
      "C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc install MicrosoftDefenderBackup C:\ProgramData\Microsoft\MicrosoftDefender\WUDHost.exe
        3⤵
          PID:2068
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc start MicrosoftDefenderBackup
          3⤵
            PID:1704
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc set MicrosoftDefenderBackup start SERVICE_AUTO_START && mwc start MicrosoftDefenderBackup
            3⤵
              PID:2168
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c ping -n 5 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4912
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 5 localhost
                4⤵
                • Runs ping.exe
                PID:3220
          • C:\Users\Admin\AppData\Roaming\Software\Crew_95.exe
            "C:\Users\Admin\AppData\Roaming\Software\Crew_95.exe"
            2⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:2972
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1020,i,3724086843943218842,1026644135694712596,262144 --variations-seed-version --mojo-platform-channel-handle=3740 /prefetch:8
          1⤵
            PID:2164

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Defense Evasion

          Virtualization/Sandbox Evasion

          2
          T1497

          Discovery

          Query Registry

          4
          T1012

          Virtualization/Sandbox Evasion

          2
          T1497

          System Information Discovery

          3
          T1082

          Remote System Discovery

          1
          T1018

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nszDCE5.tmp\System.dll
            Filesize

            11KB

            MD5

            0063d48afe5a0cdc02833145667b6641

            SHA1

            e7eb614805d183ecb1127c62decb1a6be1b4f7a8

            SHA256

            ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7

            SHA512

            71cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0

          • C:\Users\Admin\AppData\Roaming\Outbreak\Pigeon_39.exe
            Filesize

            6.8MB

            MD5

            f7958823d5a3c0a2df7974adde4028d0

            SHA1

            bb4e28ce33d1d1346c9916593d2760596eec0cc2

            SHA256

            72a310904f5c29c586eceff7a2442dc50e82c5a0673ac62e07c793333803f0e5

            SHA512

            5d65bf146d76f0d24599e95d6b222125d717bf6a94c58034cb09a96380b92b6a672a54987acebca83ba1f9dc78ab1947fa3c9cc5856f08a0042673b78fcf9171

          • C:\Users\Admin\AppData\Roaming\Software\Crew_95.exe
            Filesize

            4.3MB

            MD5

            ef9aa9009c8df44bb806f66b8e367bf7

            SHA1

            9fdcbf944c3f6bdabe66d1d8caa058e167baa14b

            SHA256

            459d0ea5dc8c44e62020aff6016cf0a4495e217e1892bda8aaf8f2a9187d4612

            SHA512

            99e744363ac69343a394a13c1c219e9167dbf892150abd0d840f78a0d9566ecb340827d8a67a0d32365eca209c723e3d370a715151be74641dbea2a09e35eac2

          • C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe
            Filesize

            4.5MB

            MD5

            0881095412775a91dcaab9b0ff5325e4

            SHA1

            6b8001b963c6120ebfbc303f9d9e42eb7b935dba

            SHA256

            a801f1c92530887b30c21fcd5fbfe284446a918441a9ba62bb98ff23772e470d

            SHA512

            0111e64ef2b1b133f0da60e2e9885a4bc65f4c5f43cc01abe664cc4ff9202f94fc581943b27fd967076ae9d3ebe965a0a0c06842d725649bc8536f7c4d8ff521

          • C:\Users\Admin\AppData\Roaming\Software\software.exe
            Filesize

            287KB

            MD5

            86503b51f7591c77378f67f4555c3f6f

            SHA1

            1805c4ce6c71db2d35df1a635cdeacf47f8f3797

            SHA256

            22beccc542b0d6fa989a6d2b7196ef6c7830c4172d019f21725e34f4cfea7a00

            SHA512

            dd9729b9fbc78e3e3fdd9b7369ac92b42432e65b3b6ce62c757690964aa08f091e728c5780e839cecb12bbd619a0a74c50990fc9608210cacfa6eefabad648b2

          • memory/2168-56-0x00000000008A0000-0x00000000014E6000-memory.dmp
            Filesize

            12.3MB

          • memory/2168-20-0x00000000008A0000-0x00000000014E6000-memory.dmp
            Filesize

            12.3MB

          • memory/2168-18-0x00000000008A1000-0x00000000008B0000-memory.dmp
            Filesize

            60KB

          • memory/2168-17-0x0000000076F14000-0x0000000076F16000-memory.dmp
            Filesize

            8KB

          • memory/2168-15-0x00000000008A0000-0x00000000014E6000-memory.dmp
            Filesize

            12.3MB

          • memory/2972-59-0x0000000000030000-0x0000000000A28000-memory.dmp
            Filesize

            10.0MB

          • memory/2972-62-0x0000000000030000-0x0000000000A28000-memory.dmp
            Filesize

            10.0MB

          • memory/3848-57-0x0000000000330000-0x0000000000F76000-memory.dmp
            Filesize

            12.3MB

          • memory/3848-63-0x0000000000330000-0x0000000000F76000-memory.dmp
            Filesize

            12.3MB

          • memory/4892-58-0x0000000000360000-0x0000000000DD7000-memory.dmp
            Filesize

            10.5MB

          • memory/4892-61-0x0000000000360000-0x0000000000DD7000-memory.dmp
            Filesize

            10.5MB

          • memory/4892-67-0x0000000000360000-0x0000000000DD7000-memory.dmp
            Filesize

            10.5MB

          • memory/4892-75-0x0000000000360000-0x0000000000DD7000-memory.dmp
            Filesize

            10.5MB