Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 04:54

General

  • Target

    212304eb98101ce27343865a908930d4_JaffaCakes118.exe

  • Size

    400KB

  • MD5

    212304eb98101ce27343865a908930d4

  • SHA1

    99677bd0d528d4c16487cb50537a52273f686050

  • SHA256

    039f50335a9301b22bae7dee09e4669a86f77639d78734d264111ba0ae444abd

  • SHA512

    3d4c7d2ba304fb1acba8e2be2f48f25e482aa764623143415e753460d416541c271f2ad4c10eea73e3e0e2df5a49f16cc926fa2ee666d2f45290253bfce42a94

  • SSDEEP

    6144:s3aR7Pq9ZFwIv/cBtKNa0ZiGv27KCoTdIL4EZxRZ9NHgFZWdhjHw5tiC9mALOJ53:2m8vitoa0K7KCoRUZxjUZWvWl93OJjt

Malware Config

Extracted

Family

raccoon

Version

1.7.2

Botnet

9ba64f4b6fe448911470a88f09d6e7d5b92ff0ab

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\212304eb98101ce27343865a908930d4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\212304eb98101ce27343865a908930d4_JaffaCakes118.exe"
    1⤵
    • Modifies system certificate store
    PID:2404

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2404-3-0x0000000000400000-0x0000000000494000-memory.dmp
    Filesize

    592KB

  • memory/2404-2-0x00000000002A0000-0x0000000000332000-memory.dmp
    Filesize

    584KB

  • memory/2404-1-0x0000000002D80000-0x0000000002E80000-memory.dmp
    Filesize

    1024KB

  • memory/2404-4-0x0000000000400000-0x0000000002BDB000-memory.dmp
    Filesize

    39.9MB

  • memory/2404-6-0x0000000002D80000-0x0000000002E80000-memory.dmp
    Filesize

    1024KB

  • memory/2404-7-0x00000000002A0000-0x0000000000332000-memory.dmp
    Filesize

    584KB