Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
a748b57cfce986e9807d621dfad23b51_JaffaCakes118.exe
Resource
win7-20240319-en
General
-
Target
a748b57cfce986e9807d621dfad23b51_JaffaCakes118.exe
-
Size
406KB
-
MD5
a748b57cfce986e9807d621dfad23b51
-
SHA1
fb8fe85db6ec1c161e4a2100df0267a743b07031
-
SHA256
1faa3ca4bb018ed42a8c59b1d48886eadc2ac59a64d762ac600bc2af442b8389
-
SHA512
46914209095c7c56609bf457aa543510903045c35dae74ffaecf6e7ccc2006d3dafe0b293ee316db0447ab94b38dbe908b005c4e1d38f5f5bd54fa61179fef69
-
SSDEEP
6144:kgmVQorT9wi5eG/NwdgQqhP8dgaGu3qcJbQPyumeL5D:kPfT7f/NwdgQ2UdgaJ3jyPvme5
Malware Config
Extracted
redline
777
oucesesstor.xyz:81
edaycamanel.xyz:81
-
auth_value
164c9110509d4287fde8e8f70e9d3b36
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2292-6-0x0000000002780000-0x00000000027A4000-memory.dmp family_redline behavioral2/memory/2292-9-0x0000000002930000-0x0000000002952000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2292-6-0x0000000002780000-0x00000000027A4000-memory.dmp family_sectoprat behavioral2/memory/2292-7-0x0000000004F50000-0x0000000004F60000-memory.dmp family_sectoprat behavioral2/memory/2292-9-0x0000000002930000-0x0000000002952000-memory.dmp family_sectoprat
Processes
-
C:\Users\Admin\AppData\Local\Temp\a748b57cfce986e9807d621dfad23b51_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a748b57cfce986e9807d621dfad23b51_JaffaCakes118.exe"1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3388 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2292-1-0x0000000000800000-0x0000000000900000-memory.dmpFilesize
1024KB
-
memory/2292-2-0x00000000024E0000-0x0000000002510000-memory.dmpFilesize
192KB
-
memory/2292-3-0x0000000000400000-0x0000000000797000-memory.dmpFilesize
3.6MB
-
memory/2292-4-0x0000000074BC0000-0x0000000075370000-memory.dmpFilesize
7.7MB
-
memory/2292-5-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/2292-6-0x0000000002780000-0x00000000027A4000-memory.dmpFilesize
144KB
-
memory/2292-7-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/2292-8-0x0000000004F60000-0x0000000005504000-memory.dmpFilesize
5.6MB
-
memory/2292-9-0x0000000002930000-0x0000000002952000-memory.dmpFilesize
136KB
-
memory/2292-10-0x0000000005510000-0x0000000005B28000-memory.dmpFilesize
6.1MB
-
memory/2292-11-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/2292-12-0x0000000005B30000-0x0000000005C3A000-memory.dmpFilesize
1.0MB
-
memory/2292-13-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/2292-14-0x0000000004F10000-0x0000000004F4C000-memory.dmpFilesize
240KB
-
memory/2292-15-0x0000000000400000-0x0000000000797000-memory.dmpFilesize
3.6MB
-
memory/2292-16-0x0000000005C80000-0x0000000005CCC000-memory.dmpFilesize
304KB
-
memory/2292-17-0x0000000000800000-0x0000000000900000-memory.dmpFilesize
1024KB
-
memory/2292-18-0x00000000024E0000-0x0000000002510000-memory.dmpFilesize
192KB
-
memory/2292-20-0x0000000074BC0000-0x0000000075370000-memory.dmpFilesize
7.7MB
-
memory/2292-21-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/2292-23-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB