Analysis

  • max time kernel
    139s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 11:36

General

  • Target

    f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe

  • Size

    505KB

  • MD5

    f5ade07e67a5a88cd01271d50f2a6ed4

  • SHA1

    15011c885d34a35c0b09ca852e3c9bcf8509a179

  • SHA256

    e855c5bb4634a61166fdd9b1b807998c5304cd52d0c064fcfdf0c501b0c70ac8

  • SHA512

    8fa01c8477c1091c376963584e1c4fd18a6978e5c4b66e33a432b4d7f542f952ebedcdb95a1b9ab60c8069ec14f90df7263921a5968911341c281a129032e2dd

  • SSDEEP

    12288:7hVk86CkQULOFuQaAc3DZMR6rh7OerzpW7HekhQIqfRPr:1hmBQ7c3dMR63P

Malware Config

Extracted

Family

redline

Botnet

@andomian

C2

45.132.104.217:12780

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Checks computer location settings
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FTkWkcEIw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp12A8.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:952
    • C:\Users\Admin\AppData\Local\Temp\f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe
      "{path}"
      2⤵
        PID:4088
      • C:\Users\Admin\AppData\Local\Temp\f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe
        "{path}"
        2⤵
          PID:3644

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f5ade07e67a5a88cd01271d50f2a6ed4_JaffaCakes118.exe.log

              Filesize

              1KB

              MD5

              e08f822522c617a40840c62e4b0fb45e

              SHA1

              ae516dca4da5234be6676d3f234c19ec55725be7

              SHA256

              bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7

              SHA512

              894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4

            • C:\Users\Admin\AppData\Local\Temp\tmp12A8.tmp

              Filesize

              1KB

              MD5

              f3bf35787ed5ef2c4a9cfc744118e477

              SHA1

              e7d8894a60c5e93f0e9b253e94527d58b323d72c

              SHA256

              aae09af0c88e05a0655e9bcf3e4a141e06dffc23e48f00b6b77cb53efa2849ec

              SHA512

              e701febb11608856d2007f7a680fdfb0f4b98fc1a87e11e706b4da0a4331e4a965a9541ab99f0e0e2c4bfbe0592169c506940711c68165007666f6eb4b069a33

            • memory/3644-28-0x00000000057B0000-0x00000000057C0000-memory.dmp

              Filesize

              64KB

            • memory/3644-27-0x00000000751D0000-0x0000000075980000-memory.dmp

              Filesize

              7.7MB

            • memory/3644-26-0x0000000006590000-0x00000000065DC000-memory.dmp

              Filesize

              304KB

            • memory/3644-25-0x0000000005A00000-0x0000000005A3C000-memory.dmp

              Filesize

              240KB

            • memory/3644-24-0x00000000057B0000-0x00000000057C0000-memory.dmp

              Filesize

              64KB

            • memory/3644-23-0x0000000006480000-0x000000000658A000-memory.dmp

              Filesize

              1.0MB

            • memory/3644-22-0x00000000058D0000-0x00000000058E2000-memory.dmp

              Filesize

              72KB

            • memory/3644-21-0x0000000006710000-0x0000000006D28000-memory.dmp

              Filesize

              6.1MB

            • memory/3644-20-0x00000000751D0000-0x0000000075980000-memory.dmp

              Filesize

              7.7MB

            • memory/3644-16-0x0000000000400000-0x0000000000420000-memory.dmp

              Filesize

              128KB

            • memory/5108-6-0x0000000005430000-0x0000000005438000-memory.dmp

              Filesize

              32KB

            • memory/5108-7-0x0000000005BA0000-0x0000000005C3C000-memory.dmp

              Filesize

              624KB

            • memory/5108-11-0x0000000005980000-0x00000000059A2000-memory.dmp

              Filesize

              136KB

            • memory/5108-10-0x0000000005FA0000-0x0000000006010000-memory.dmp

              Filesize

              448KB

            • memory/5108-18-0x00000000751D0000-0x0000000075980000-memory.dmp

              Filesize

              7.7MB

            • memory/5108-9-0x0000000007EB0000-0x0000000007EC0000-memory.dmp

              Filesize

              64KB

            • memory/5108-8-0x00000000751D0000-0x0000000075980000-memory.dmp

              Filesize

              7.7MB

            • memory/5108-12-0x0000000006660000-0x00000000066C6000-memory.dmp

              Filesize

              408KB

            • memory/5108-0-0x0000000000FE0000-0x0000000001064000-memory.dmp

              Filesize

              528KB

            • memory/5108-5-0x0000000007F00000-0x0000000007F0A000-memory.dmp

              Filesize

              40KB

            • memory/5108-4-0x0000000007EB0000-0x0000000007EC0000-memory.dmp

              Filesize

              64KB

            • memory/5108-3-0x0000000007F20000-0x0000000007FB2000-memory.dmp

              Filesize

              584KB

            • memory/5108-2-0x0000000008430000-0x00000000089D4000-memory.dmp

              Filesize

              5.6MB

            • memory/5108-1-0x00000000751D0000-0x0000000075980000-memory.dmp

              Filesize

              7.7MB