Malware Analysis Report

2025-06-16 01:47

Sample ID 240406-kt1xfsfd99
Target e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118
SHA256 e74ed2209bc94f38ef5c90e655bbe8c34ddc0dd6b5c0b60ce14ee4f8aeac928a
Tags
redline sectoprat infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e74ed2209bc94f38ef5c90e655bbe8c34ddc0dd6b5c0b60ce14ee4f8aeac928a

Threat Level: Known bad

The file e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

redline sectoprat infostealer rat trojan

RedLine payload

SectopRAT

SectopRAT payload

RedLine

Suspicious use of SetThreadContext

Checks processor information in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-06 08:54

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-06 08:54

Reported

2024-04-06 08:56

Platform

win7-20240319-en

Max time kernel

119s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe"

Signatures

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe"

Network

N/A

Files

memory/2228-0-0x00000000000B0000-0x00000000000D8000-memory.dmp

memory/2228-1-0x000007FEF5BE0000-0x000007FEF65CC000-memory.dmp

memory/2228-2-0x000000001B260000-0x000000001B2E0000-memory.dmp

memory/2228-3-0x000007FEF5BE0000-0x000007FEF65CC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-06 08:54

Reported

2024-04-06 08:56

Platform

win10v2004-20240226-en

Max time kernel

147s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4480 set thread context of 2644 N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4480 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4480 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4480 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4480 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4480 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4480 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4480 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4480 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

Processes

C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e0941b63af863bb26dd82dafe08a5c27_JaffaCakes118.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

#cmd

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 194.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
FR 141.94.188.138:46419 tcp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
FR 141.94.188.138:46419 tcp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
FR 141.94.188.138:46419 tcp
FR 141.94.188.138:46419 tcp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
FR 141.94.188.138:46419 tcp
FR 141.94.188.138:46419 tcp
US 8.8.8.8:53 8.179.89.13.in-addr.arpa udp

Files

memory/4480-0-0x0000000000620000-0x0000000000648000-memory.dmp

memory/4480-1-0x00007FFA6FEF0000-0x00007FFA709B1000-memory.dmp

memory/4480-2-0x000000001B400000-0x000000001B410000-memory.dmp

memory/4480-5-0x00007FFA6FEF0000-0x00007FFA709B1000-memory.dmp

memory/2644-6-0x0000000074F40000-0x00000000756F0000-memory.dmp

memory/2644-7-0x0000000000600000-0x0000000000622000-memory.dmp

memory/2644-8-0x0000000005100000-0x0000000005718000-memory.dmp

memory/2644-9-0x0000000002650000-0x0000000002662000-memory.dmp

memory/2644-10-0x0000000004C30000-0x0000000004D3A000-memory.dmp

memory/2644-11-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

memory/2644-12-0x0000000004B60000-0x0000000004B9C000-memory.dmp

memory/2644-13-0x0000000004BB0000-0x0000000004BFC000-memory.dmp

memory/2644-14-0x0000000074F40000-0x00000000756F0000-memory.dmp

memory/2644-15-0x0000000004BA0000-0x0000000004BB0000-memory.dmp