Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2024, 20:54

General

  • Target

    c28139393519f06364fa01bb1f1a4ab0_JaffaCakes118.exe

  • Size

    738KB

  • MD5

    c28139393519f06364fa01bb1f1a4ab0

  • SHA1

    981cac82546e2113918974459aa0a8ec64fd9171

  • SHA256

    5007ecf49dfc17fb9a8fba25576762a57cf5e43bbf151382d2c6b91ae30b865f

  • SHA512

    de56be8bbd9cf7b4a4959b524e448d3539c5a5a0145896733a93d176c93452afa0094ef6cd92b59a49d67033f55ce31a531f8407a5482a1d041e403971adb0ee

  • SSDEEP

    12288:Y2gi3qbvjv21MBzQ2j1DS0o7R+mLmne2cdZN826YxhJZ1639JTEtMANit2dYwTT:Ytbb7v5c2lxo7RrLm5cHNEchJv63/oQg

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c28139393519f06364fa01bb1f1a4ab0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c28139393519f06364fa01bb1f1a4ab0_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4236
    • C:\Windows\SYSTEM32\netsh.exe
      "netsh" wlan show profiles
      2⤵
        PID:3308

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4236-0-0x00000000006C0000-0x0000000000774000-memory.dmp

      Filesize

      720KB

    • memory/4236-1-0x000000001B850000-0x000000001BA2A000-memory.dmp

      Filesize

      1.9MB

    • memory/4236-2-0x00007FF8B74D0000-0x00007FF8B7F91000-memory.dmp

      Filesize

      10.8MB

    • memory/4236-3-0x00000000029A0000-0x00000000029B0000-memory.dmp

      Filesize

      64KB

    • memory/4236-4-0x00000000029A0000-0x00000000029B0000-memory.dmp

      Filesize

      64KB

    • memory/4236-5-0x00000000029A0000-0x00000000029B0000-memory.dmp

      Filesize

      64KB

    • memory/4236-6-0x00000000029E0000-0x0000000002A2A000-memory.dmp

      Filesize

      296KB

    • memory/4236-7-0x00000000029A0000-0x00000000029B0000-memory.dmp

      Filesize

      64KB

    • memory/4236-8-0x0000000000400000-0x00000000004C0000-memory.dmp

      Filesize

      768KB

    • memory/4236-22-0x00007FF8B74D0000-0x00007FF8B7F91000-memory.dmp

      Filesize

      10.8MB