Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe
-
Size
298KB
-
MD5
e77ee5479b6e8da5b7f09dfac202647f
-
SHA1
c61d85632f576e96dbc2dde78eff64c08f2858d9
-
SHA256
756151e99176d79019cc0e9c44b5ed9fd81d890d0fd51e49806aeb1f5c8fd8d9
-
SHA512
b568dd024146a9cc53860b67fa492eb1e961b9fbb75cc2b3d893253be50f399f4562f6903524894a553e5ed91b16966dea4b01de9260a83947356904a52cf832
-
SSDEEP
6144:nbdT3QrOeIyAQgtpy5u+eCHNHlOMx2scNZn+8:BT3QiPQg/+us8PsW9
Malware Config
Extracted
redline
@Crypto4ok
185.213.209.36:36533
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2840-15-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2840-18-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2840-20-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2840-23-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2840-21-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2840-15-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2840-18-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2840-20-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2840-23-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2840-21-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exedescription pid Process procid_target PID 1480 set thread context of 2840 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exepowershell.exee77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exee77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exepid Process 1884 powershell.exe 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exee77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 1884 powershell.exe Token: SeDebugPrivilege 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exedescription pid Process procid_target PID 1480 wrote to memory of 1884 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 30 PID 1480 wrote to memory of 1884 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 30 PID 1480 wrote to memory of 1884 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 30 PID 1480 wrote to memory of 1884 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 30 PID 1480 wrote to memory of 2840 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 33 PID 1480 wrote to memory of 2840 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 33 PID 1480 wrote to memory of 2840 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 33 PID 1480 wrote to memory of 2840 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 33 PID 1480 wrote to memory of 2840 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 33 PID 1480 wrote to memory of 2840 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 33 PID 1480 wrote to memory of 2840 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 33 PID 1480 wrote to memory of 2840 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 33 PID 1480 wrote to memory of 2840 1480 e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgAwAA==2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e77ee5479b6e8da5b7f09dfac202647f_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
PID:2840
-