Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe
-
Size
3.3MB
-
MD5
0d6c896c5a03275b016b6c396a3188d6
-
SHA1
3b4d5c81b97d58770adffec69073745e938c93b2
-
SHA256
ef4bfc8695a0eef80365ae2e0bbf8078045e10e71a33e5fcae0c2ffddd923001
-
SHA512
f5bd40920803a173a5db025f04a3620065bcf0f2c87d8469a33a1729424180483d06ec05934e24c76d58c03108616e42aa68efe2be085f1a8c330fa81da32528
-
SSDEEP
49152:ij5TDib7I2qjdhcqEpQeiJcCCmmO5VxwHKvRGsb3/Zw5YNUhrDOHk5+Z:ij5T2bwrxZsFmLvSIGsba6N2PUgk
Malware Config
Extracted
redline
mastif
194.156.99.23:5133
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1224-58-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1224-57-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1224-61-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1224-68-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1224-63-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/2668-33-0x0000000000C20000-0x000000000132C000-memory.dmp family_sectoprat behavioral1/memory/2668-32-0x0000000000C20000-0x000000000132C000-memory.dmp family_sectoprat behavioral1/memory/1224-58-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/1224-57-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/1224-61-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/1224-68-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/1224-63-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
@hvhbig0wner_protected.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ @hvhbig0wner_protected.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
@hvhbig0wner_protected.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion @hvhbig0wner_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion @hvhbig0wner_protected.exe -
Executes dropped EXE 3 IoCs
Processes:
@hvhbig0wner_protected.exebitch.exebitch.exepid process 2668 @hvhbig0wner_protected.exe 2448 bitch.exe 1224 bitch.exe -
Loads dropped DLL 8 IoCs
Processes:
bitch.exebitch.exepid process 2448 bitch.exe 2448 bitch.exe 2448 bitch.exe 2448 bitch.exe 2448 bitch.exe 1224 bitch.exe 1224 bitch.exe 1224 bitch.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\bitch.exe agile_net behavioral1/memory/2448-18-0x0000000000AD0000-0x0000000000C0C000-memory.dmp agile_net -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\@hvhbig0wner_protected.exe themida behavioral1/memory/2668-33-0x0000000000C20000-0x000000000132C000-memory.dmp themida behavioral1/memory/2668-32-0x0000000000C20000-0x000000000132C000-memory.dmp themida -
Processes:
@hvhbig0wner_protected.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA @hvhbig0wner_protected.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
@hvhbig0wner_protected.exepid process 2668 @hvhbig0wner_protected.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bitch.exedescription pid process target process PID 2448 set thread context of 1224 2448 bitch.exe bitch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
@hvhbig0wner_protected.exebitch.exedescription pid process Token: SeDebugPrivilege 2668 @hvhbig0wner_protected.exe Token: SeDebugPrivilege 1224 bitch.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exebitch.exedescription pid process target process PID 2912 wrote to memory of 2668 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe @hvhbig0wner_protected.exe PID 2912 wrote to memory of 2668 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe @hvhbig0wner_protected.exe PID 2912 wrote to memory of 2668 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe @hvhbig0wner_protected.exe PID 2912 wrote to memory of 2668 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe @hvhbig0wner_protected.exe PID 2912 wrote to memory of 2448 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe bitch.exe PID 2912 wrote to memory of 2448 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe bitch.exe PID 2912 wrote to memory of 2448 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe bitch.exe PID 2912 wrote to memory of 2448 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe bitch.exe PID 2912 wrote to memory of 2448 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe bitch.exe PID 2912 wrote to memory of 2448 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe bitch.exe PID 2912 wrote to memory of 2448 2912 0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe PID 2448 wrote to memory of 1224 2448 bitch.exe bitch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d6c896c5a03275b016b6c396a3188d6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\@hvhbig0wner_protected.exe"C:\Users\Admin\AppData\Local\Temp\@hvhbig0wner_protected.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\bitch.exe"C:\Users\Admin\AppData\Local\Temp\bitch.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\bitch.exe"C:\Users\Admin\AppData\Local\Temp\bitch.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5dfbb922abc575559fe4d9d7f2fd0d7b6
SHA117794751e3e258067b862a75f07fd62fcfd7a154
SHA256d2280254594d3e51d2616a960491b65b4f057aea7208a7eef7310c52ee95a6c2
SHA512a4f2e8f825ad1f291d6448a30ee08eef062d664986d22b7fde818aeceb94d4a052e86e091b3e940ea7707807c1b97190958c3cc17791ae3680de3056c49f2f52
-
Filesize
2.4MB
MD54be2db7166f7f115aa3d5c0039853517
SHA1b0fd9b8c2e08dbe168615647aeaec1ce2aaf8a75
SHA2565db5b60d090ec79a786dd4ff35eeac136db3a780143d4f5406f69782aab8e2e0
SHA512840ffcafdd6732e1e88ea435e24560d760f6de4ea5888b55de1c01718a959460d2a07ca2ec1611562aeea21e17e030b4b1b570ea7baf240ff87489f8d1b13509
-
Filesize
1.2MB
MD5d8bc4252af94863ae839997be45d9960
SHA17bcd4df0a8d7dbf0fb472b5e0271711977e7d817
SHA256513bbc0e46245839d626a178e567eceae0de663909d5594be55bb6fdef40ba1b
SHA5120eae0a66e1d88989db04c7d672ba4376fe438026cd692d5ed1490bf951941e72c5c3d597d5ceb0eda615092cccdbf03e442c51c7064a915bd1d6eadcc246564e