Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 09:35
Static task
static1
Behavioral task
behavioral1
Sample
3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe
-
Size
399KB
-
MD5
3cd7f76ee022ba55e39b8bb0f2cda5dd
-
SHA1
1e9845b57e551829985fff64415a6168fcd85e25
-
SHA256
aeb3c60ff4a2c36311ec2d8eda64f82b24c5ad0818e48e7945ec197df3c67169
-
SHA512
5110ccac07ca52aba04a9f64812eb4c3d9e8a8262e03a68edd0b2259f7917019487854a454a8c49d68f84dd7a1544a0219182c9809a0a34cc90c33f5a25bc973
-
SSDEEP
6144:m9Veb5KvBOpAaX+1B0kiPNV1eiHf9IohhXf2TGCoTMhud9UqsQObgQL29A2JIhT:mh909SpiUqDj
Malware Config
Extracted
redline
@Joindsa
193.32.164.63:3172
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2604-13-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2604-15-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2604-18-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2604-20-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2604-19-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2604-13-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2604-15-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2604-18-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2604-20-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2604-19-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exedescription pid process target process PID 3068 set thread context of 2604 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exe3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exepid process 1736 powershell.exe 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
powershell.exe3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1736 powershell.exe Token: SeIncreaseQuotaPrivilege 1736 powershell.exe Token: SeSecurityPrivilege 1736 powershell.exe Token: SeTakeOwnershipPrivilege 1736 powershell.exe Token: SeLoadDriverPrivilege 1736 powershell.exe Token: SeSystemProfilePrivilege 1736 powershell.exe Token: SeSystemtimePrivilege 1736 powershell.exe Token: SeProfSingleProcessPrivilege 1736 powershell.exe Token: SeIncBasePriorityPrivilege 1736 powershell.exe Token: SeCreatePagefilePrivilege 1736 powershell.exe Token: SeBackupPrivilege 1736 powershell.exe Token: SeRestorePrivilege 1736 powershell.exe Token: SeShutdownPrivilege 1736 powershell.exe Token: SeDebugPrivilege 1736 powershell.exe Token: SeSystemEnvironmentPrivilege 1736 powershell.exe Token: SeRemoteShutdownPrivilege 1736 powershell.exe Token: SeUndockPrivilege 1736 powershell.exe Token: SeManageVolumePrivilege 1736 powershell.exe Token: 33 1736 powershell.exe Token: 34 1736 powershell.exe Token: 35 1736 powershell.exe Token: SeDebugPrivilege 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exedescription pid process target process PID 3068 wrote to memory of 1736 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe powershell.exe PID 3068 wrote to memory of 1736 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe powershell.exe PID 3068 wrote to memory of 1736 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe powershell.exe PID 3068 wrote to memory of 1736 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe powershell.exe PID 3068 wrote to memory of 2604 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe PID 3068 wrote to memory of 2604 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe PID 3068 wrote to memory of 2604 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe PID 3068 wrote to memory of 2604 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe PID 3068 wrote to memory of 2604 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe PID 3068 wrote to memory of 2604 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe PID 3068 wrote to memory of 2604 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe PID 3068 wrote to memory of 2604 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe PID 3068 wrote to memory of 2604 3068 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe 3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.twitter.com , www.facebook.com , www.bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118.exe2⤵PID:2604