Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

06/04/2024, 07:23

240406-h79emsea89 10

06/04/2024, 07:20

240406-h6brzsea63 10

Analysis

  • max time kernel
    149s
  • max time network
    164s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/04/2024, 07:23

General

  • Target

    debc4398bfd38ad0fc3b66e930f643fa_JaffaCakes118.exe

  • Size

    160KB

  • MD5

    debc4398bfd38ad0fc3b66e930f643fa

  • SHA1

    e71df8cc92449bcfd031bb85d5963e5e940ee1c9

  • SHA256

    e96aefb8f07f72ece35d5ad8cb90adf4f5722c01b51664c6f99d6e2bbca3a5d3

  • SHA512

    b24071cf94927bffc8017c18394862827151fcc1c393b4e2ca7e2c998e8fceee03544409f30fbbd0bc1a9ccc282b4f55e010412859307bba17d88c9a1133465a

  • SSDEEP

    3072:TvqZ7ysn9tAbDL9qSbNR/5hYtABQGjHH7s0yOznBYd46B2mCkPi:jA7yZRNLhWANHH7OOziSO2mQ

Malware Config

Extracted

Family

redline

Botnet

@aye22844

C2

51.254.69.209:48987

Attributes
  • auth_value

    ad39d6a8ea7823f2a92f57ebaa4c98a5

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\debc4398bfd38ad0fc3b66e930f643fa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\debc4398bfd38ad0fc3b66e930f643fa_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      #cmd
      2⤵
        PID:4556

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1904-5-0x00007FF9E6170000-0x00007FF9E6C32000-memory.dmp

      Filesize

      10.8MB

    • memory/1904-1-0x00007FF9E6170000-0x00007FF9E6C32000-memory.dmp

      Filesize

      10.8MB

    • memory/1904-2-0x000000001B2C0000-0x000000001B2D0000-memory.dmp

      Filesize

      64KB

    • memory/1904-0-0x00000000006C0000-0x00000000006EA000-memory.dmp

      Filesize

      168KB

    • memory/4556-7-0x0000000005770000-0x0000000005D88000-memory.dmp

      Filesize

      6.1MB

    • memory/4556-6-0x00000000749C0000-0x0000000075171000-memory.dmp

      Filesize

      7.7MB

    • memory/4556-3-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/4556-8-0x00000000051C0000-0x00000000051D2000-memory.dmp

      Filesize

      72KB

    • memory/4556-9-0x00000000052F0000-0x00000000053FA000-memory.dmp

      Filesize

      1.0MB

    • memory/4556-10-0x0000000005250000-0x000000000528C000-memory.dmp

      Filesize

      240KB

    • memory/4556-11-0x0000000005240000-0x0000000005250000-memory.dmp

      Filesize

      64KB

    • memory/4556-12-0x0000000005290000-0x00000000052DC000-memory.dmp

      Filesize

      304KB

    • memory/4556-13-0x00000000749C0000-0x0000000075171000-memory.dmp

      Filesize

      7.7MB

    • memory/4556-14-0x0000000005240000-0x0000000005250000-memory.dmp

      Filesize

      64KB