Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe
-
Size
416KB
-
MD5
3d94c97113665616bb2ff09440a5bc27
-
SHA1
5af98e2f9e6183427893987961e049362a57c702
-
SHA256
586465bf2feff2badcc4abc5e37c030cf8476b836c88803095ee6f53c6e35857
-
SHA512
5fa61c6fe9a622fc3553af05fd0e5d9600c05dd850f61cd756a79bcfc8e14812a2302387f966cefd651fae94080339c4d7f85184106af9253bb9828fee76a12c
-
SSDEEP
12288:tttEi0F8ltcKn2HMAS9iLW851+9dN7KOY8N9Oe+9lauWfx7sN8zkdI4+qWcpORzw:R0GZ2Ha9P8K9d9Kbn9
Malware Config
Extracted
redline
@lockfay
194.15.46.144:36848
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2600-19-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2600-17-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2600-22-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2600-23-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2600-24-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2600-19-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2600-17-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2600-22-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2600-23-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2600-24-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exedescription pid process target process PID 2088 set thread context of 2600 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exe3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exepid process 2128 powershell.exe 2736 powershell.exe 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
powershell.exepowershell.exe3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2128 powershell.exe Token: SeIncreaseQuotaPrivilege 2128 powershell.exe Token: SeSecurityPrivilege 2128 powershell.exe Token: SeTakeOwnershipPrivilege 2128 powershell.exe Token: SeLoadDriverPrivilege 2128 powershell.exe Token: SeSystemProfilePrivilege 2128 powershell.exe Token: SeSystemtimePrivilege 2128 powershell.exe Token: SeProfSingleProcessPrivilege 2128 powershell.exe Token: SeIncBasePriorityPrivilege 2128 powershell.exe Token: SeCreatePagefilePrivilege 2128 powershell.exe Token: SeBackupPrivilege 2128 powershell.exe Token: SeRestorePrivilege 2128 powershell.exe Token: SeShutdownPrivilege 2128 powershell.exe Token: SeDebugPrivilege 2128 powershell.exe Token: SeSystemEnvironmentPrivilege 2128 powershell.exe Token: SeRemoteShutdownPrivilege 2128 powershell.exe Token: SeUndockPrivilege 2128 powershell.exe Token: SeManageVolumePrivilege 2128 powershell.exe Token: 33 2128 powershell.exe Token: 34 2128 powershell.exe Token: 35 2128 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeIncreaseQuotaPrivilege 2736 powershell.exe Token: SeSecurityPrivilege 2736 powershell.exe Token: SeTakeOwnershipPrivilege 2736 powershell.exe Token: SeLoadDriverPrivilege 2736 powershell.exe Token: SeSystemProfilePrivilege 2736 powershell.exe Token: SeSystemtimePrivilege 2736 powershell.exe Token: SeProfSingleProcessPrivilege 2736 powershell.exe Token: SeIncBasePriorityPrivilege 2736 powershell.exe Token: SeCreatePagefilePrivilege 2736 powershell.exe Token: SeBackupPrivilege 2736 powershell.exe Token: SeRestorePrivilege 2736 powershell.exe Token: SeShutdownPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeSystemEnvironmentPrivilege 2736 powershell.exe Token: SeRemoteShutdownPrivilege 2736 powershell.exe Token: SeUndockPrivilege 2736 powershell.exe Token: SeManageVolumePrivilege 2736 powershell.exe Token: 33 2736 powershell.exe Token: 34 2736 powershell.exe Token: 35 2736 powershell.exe Token: SeDebugPrivilege 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exedescription pid process target process PID 2088 wrote to memory of 2128 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe powershell.exe PID 2088 wrote to memory of 2128 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe powershell.exe PID 2088 wrote to memory of 2128 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe powershell.exe PID 2088 wrote to memory of 2128 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe powershell.exe PID 2088 wrote to memory of 2736 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe powershell.exe PID 2088 wrote to memory of 2736 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe powershell.exe PID 2088 wrote to memory of 2736 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe powershell.exe PID 2088 wrote to memory of 2736 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe powershell.exe PID 2088 wrote to memory of 2576 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2576 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2576 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2576 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2600 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2600 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2600 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2600 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2600 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2600 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2600 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2600 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe PID 2088 wrote to memory of 2600 2088 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe 3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe2⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3d94c97113665616bb2ff09440a5bc27_JaffaCakes118.exe2⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XYNBXT8T5L5MKJUPI9UE.temp
Filesize7KB
MD55bce7ca791f710fdae2dbd25bdab5914
SHA16b8921d3371d18fe46108ef3b6755bc71c13d512
SHA2568b5d7522f937b0d65daae43ea4d5690234872a5f3d316d7ce616e01fcf13955c
SHA512eeed8d9764252c7a31b469d3d0690927e9ccf0c947c5218d7fec9712da1049e6482226406bc92f438bdf0212937698c8450d8712d51ee145265016cb48db9f5d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5ba0b30bd693b1c00680499e4291eb175
SHA1c6c4d6a8ec7354c4d69bc5ad8172948d8d60e89b
SHA2562b536daca0c58eee024befe7cd8d4c17aaea2241f933857e38f66ff2485612a4
SHA5127444a4d0630c80531c526cce88b2c35d650e3ae6ef52366e671d24d253f82953e7b0bad0c4975ba07e7a02397ad1d0e008c141bc64d29b164ba89135dd6200f4