Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe
-
Size
331KB
-
MD5
203dcfe837a8a2273d26b5d2c8500660
-
SHA1
757d3d7232f339b746281b2d328e55a5bcd2a971
-
SHA256
7e034e6e6aade8d171cef476c5068d10c385bd84858d8073850ad7163bc25f23
-
SHA512
bd03bc3b5bf259a2d1df138d93f45d2e2c37ee05e1e3205bfbf5684d39f1b6fa521bef61503046f04610e0a302219f279a11250dcc1179aa808608ca6c6515f0
-
SSDEEP
6144:gUBWwBum0a7QXqCCgHBK7khCZZQtf9JMHHK8iM55f5GHagKlUJFGUvA75GL:Qzm0La/gHBHhCCuHliMPfWMlsq8L
Malware Config
Extracted
redline
@keynejkee
164.132.72.186:18717
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1600-7-0x0000000000400000-0x0000000000427000-memory.dmp family_redline behavioral2/memory/1600-14-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1600-7-0x0000000000400000-0x0000000000427000-memory.dmp family_sectoprat behavioral2/memory/1600-14-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
regasm.exepid process 1600 regasm.exe 1600 regasm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exedescription pid process target process PID 1568 set thread context of 1600 1568 203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe regasm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regasm.exepid process 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe 1600 regasm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exepid process 1568 203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exepid process 1568 203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exedescription pid process target process PID 1568 wrote to memory of 1600 1568 203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe regasm.exe PID 1568 wrote to memory of 1600 1568 203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe regasm.exe PID 1568 wrote to memory of 1600 1568 203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe regasm.exe PID 1568 wrote to memory of 1600 1568 203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe regasm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\203dcfe837a8a2273d26b5d2c8500660_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1600