Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe
-
Size
1024KB
-
MD5
73af1e55e0dd26fbbb68c774c92cc525
-
SHA1
8616b22442ad17a0a729686d5376d409de403f55
-
SHA256
f535ab1b315411a456a7f121e1666c37a513f567ff4f6e6fa0e5392efbcb3bab
-
SHA512
d394a548f8cdf1b7068f4b0f29bc1e277fa591b00078233cd5aa37ddf1f7c67913aef1d8d28861d4804226159d27f6d288ec49057bcfab5b82b1955391e4b0b8
-
SSDEEP
24576:9k70TrcCUsAr38zPlJA1fHWAaaS5E6e7KAa:9kQTApV38zfA1Rn7KA
Malware Config
Extracted
redline
mix
193.38.55.28:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2140-14-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/2140-18-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/2140-11-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/2140-16-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/2140-9-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exedescription pid process target process PID 1724 set thread context of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2800 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegAsm.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2140 RegAsm.exe Token: SeDebugPrivilege 2800 taskkill.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exeRegAsm.execmd.exedescription pid process target process PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 1724 wrote to memory of 2140 1724 73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe RegAsm.exe PID 2140 wrote to memory of 2520 2140 RegAsm.exe cmd.exe PID 2140 wrote to memory of 2520 2140 RegAsm.exe cmd.exe PID 2140 wrote to memory of 2520 2140 RegAsm.exe cmd.exe PID 2140 wrote to memory of 2520 2140 RegAsm.exe cmd.exe PID 2520 wrote to memory of 2800 2520 cmd.exe taskkill.exe PID 2520 wrote to memory of 2800 2520 cmd.exe taskkill.exe PID 2520 wrote to memory of 2800 2520 cmd.exe taskkill.exe PID 2520 wrote to memory of 2800 2520 cmd.exe taskkill.exe PID 2520 wrote to memory of 2560 2520 cmd.exe choice.exe PID 2520 wrote to memory of 2560 2520 cmd.exe choice.exe PID 2520 wrote to memory of 2560 2520 cmd.exe choice.exe PID 2520 wrote to memory of 2560 2520 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73af1e55e0dd26fbbb68c774c92cc525_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 2140 && choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 21404⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:2560
-
-
-