Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 11:36

General

  • Target

    f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe

  • Size

    505KB

  • MD5

    f5ade07e67a5a88cd01271d50f2a6ed4

  • SHA1

    15011c885d34a35c0b09ca852e3c9bcf8509a179

  • SHA256

    e855c5bb4634a61166fdd9b1b807998c5304cd52d0c064fcfdf0c501b0c70ac8

  • SHA512

    8fa01c8477c1091c376963584e1c4fd18a6978e5c4b66e33a432b4d7f542f952ebedcdb95a1b9ab60c8069ec14f90df7263921a5968911341c281a129032e2dd

  • SSDEEP

    12288:7hVk86CkQULOFuQaAc3DZMR6rh7OerzpW7HekhQIqfRPr:1hmBQ7c3dMR63P

Malware Config

Extracted

Family

redline

Botnet

@andomian

C2

45.132.104.217:12780

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 7 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTkWkcEIw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp97BD.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2912
    • C:\Users\Admin\AppData\Local\Temp\f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe
      "{path}"
      2⤵
        PID:2488
      • C:\Users\Admin\AppData\Local\Temp\f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe
        "{path}"
        2⤵
          PID:2660
        • C:\Users\Admin\AppData\Local\Temp\f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe
          "{path}"
          2⤵
            PID:2440

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp97BD.tmp

          Filesize

          1KB

          MD5

          c2bd8af136898c5735f0e7c72f7543ca

          SHA1

          19734395dbd179490a547a43b65a63ad2a743d7e

          SHA256

          56607b23f4244b29018708842320a3f6695ae56fd3fd1bea11e9dda68bbfb489

          SHA512

          3ef2f364dd51eff5d60a0558d1bb45fd1f19d45a3f1f85cf802ed4ea1e651976c02986a740c7dab93faa142dfeef777a5f72e6c710cd88d00be78e786e044e23

        • memory/2276-21-0x00000000742A0000-0x000000007498E000-memory.dmp

          Filesize

          6.9MB

        • memory/2276-5-0x0000000007100000-0x0000000007140000-memory.dmp

          Filesize

          256KB

        • memory/2276-0-0x00000000009E0000-0x0000000000A64000-memory.dmp

          Filesize

          528KB

        • memory/2276-4-0x00000000742A0000-0x000000007498E000-memory.dmp

          Filesize

          6.9MB

        • memory/2276-2-0x0000000007100000-0x0000000007140000-memory.dmp

          Filesize

          256KB

        • memory/2276-6-0x0000000004B10000-0x0000000004B80000-memory.dmp

          Filesize

          448KB

        • memory/2276-7-0x00000000008B0000-0x00000000008D2000-memory.dmp

          Filesize

          136KB

        • memory/2276-1-0x00000000742A0000-0x000000007498E000-memory.dmp

          Filesize

          6.9MB

        • memory/2276-3-0x00000000004F0000-0x00000000004F8000-memory.dmp

          Filesize

          32KB

        • memory/2440-13-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2440-11-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2440-16-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2440-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2440-19-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2440-15-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2440-22-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2440-24-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2440-25-0x00000000742A0000-0x000000007498E000-memory.dmp

          Filesize

          6.9MB

        • memory/2440-26-0x0000000000490000-0x00000000004D0000-memory.dmp

          Filesize

          256KB

        • memory/2440-27-0x00000000742A0000-0x000000007498E000-memory.dmp

          Filesize

          6.9MB

        • memory/2440-28-0x0000000000490000-0x00000000004D0000-memory.dmp

          Filesize

          256KB