Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 10:44
Static task
static1
Behavioral task
behavioral1
Sample
9428c2451bc098d6401dc094e2ae8e3f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
9428c2451bc098d6401dc094e2ae8e3f_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
9428c2451bc098d6401dc094e2ae8e3f
-
SHA1
a2d7de9ba7516ed1386cb923db38d8dc3c3ccc1d
-
SHA256
a16ffac57803b1af0f18e383e80971722e65661601019a884ed3d2c7d3be8cc9
-
SHA512
de771b7fd8731af0ca29832f8f7f830f85ed15784658eeef0a67ee84362973423315551dadf847186dc96691eac355f10d99506185d7bfbe3dd700563a130cd8
-
SSDEEP
49152:sWMBHn8mewe80/X5SGPUTS4+HQrr3G8kwEArdOVs2ZDVvB67lCJFd:qTfeFSGPibjXeAcVDZBv87lkFd
Malware Config
Extracted
redline
@Piffik
185.183.32.195:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb0-9.dat family_redline behavioral2/memory/4792-35-0x0000000000420000-0x0000000000442000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 3 IoCs
resource yara_rule behavioral2/memory/244-4-0x000000001DDC0000-0x000000001DFDA000-memory.dmp family_sectoprat behavioral2/files/0x0008000000023cb0-9.dat family_sectoprat behavioral2/memory/4792-35-0x0000000000420000-0x0000000000442000-memory.dmp family_sectoprat -
Sectoprat family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 9428c2451bc098d6401dc094e2ae8e3f_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation BuildETH.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation RuntimeServiseDriver.exe -
Executes dropped EXE 4 IoCs
pid Process 4792 cryptbuild.exe 4680 BuildETH.exe 3092 RuntimeServiseDriver.exe 1356 sihost32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cryptbuild.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3268 schtasks.exe 2960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4680 BuildETH.exe 3092 RuntimeServiseDriver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4680 BuildETH.exe Token: SeDebugPrivilege 3092 RuntimeServiseDriver.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 244 wrote to memory of 4792 244 9428c2451bc098d6401dc094e2ae8e3f_JaffaCakes118.exe 82 PID 244 wrote to memory of 4792 244 9428c2451bc098d6401dc094e2ae8e3f_JaffaCakes118.exe 82 PID 244 wrote to memory of 4792 244 9428c2451bc098d6401dc094e2ae8e3f_JaffaCakes118.exe 82 PID 244 wrote to memory of 4680 244 9428c2451bc098d6401dc094e2ae8e3f_JaffaCakes118.exe 84 PID 244 wrote to memory of 4680 244 9428c2451bc098d6401dc094e2ae8e3f_JaffaCakes118.exe 84 PID 4680 wrote to memory of 2148 4680 BuildETH.exe 85 PID 4680 wrote to memory of 2148 4680 BuildETH.exe 85 PID 2148 wrote to memory of 3268 2148 cmd.exe 87 PID 2148 wrote to memory of 3268 2148 cmd.exe 87 PID 4680 wrote to memory of 3092 4680 BuildETH.exe 92 PID 4680 wrote to memory of 3092 4680 BuildETH.exe 92 PID 3092 wrote to memory of 1604 3092 RuntimeServiseDriver.exe 94 PID 3092 wrote to memory of 1604 3092 RuntimeServiseDriver.exe 94 PID 1604 wrote to memory of 2960 1604 cmd.exe 96 PID 1604 wrote to memory of 2960 1604 cmd.exe 96 PID 3092 wrote to memory of 1356 3092 RuntimeServiseDriver.exe 97 PID 3092 wrote to memory of 1356 3092 RuntimeServiseDriver.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9428c2451bc098d6401dc094e2ae8e3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9428c2451bc098d6401dc094e2ae8e3f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:244 -
C:\ProgramData\cryptbuild.exe"C:\ProgramData\cryptbuild.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4792
-
-
C:\ProgramData\BuildETH.exe"C:\ProgramData\BuildETH.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "RuntimeServiseDriver" /tr '"C:\Users\Admin\AppData\Local\Temp\RuntimeServiseDriver.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "RuntimeServiseDriver" /tr '"C:\Users\Admin\AppData\Local\Temp\RuntimeServiseDriver.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:3268
-
-
-
C:\Users\Admin\AppData\Local\Temp\RuntimeServiseDriver.exe"C:\Users\Admin\AppData\Local\Temp\RuntimeServiseDriver.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "RuntimeServiseDriver" /tr '"C:\Users\Admin\AppData\Local\Temp\RuntimeServiseDriver.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "RuntimeServiseDriver" /tr '"C:\Users\Admin\AppData\Local\Temp\RuntimeServiseDriver.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:2960
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"4⤵
- Executes dropped EXE
PID:1356
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD538aa8b375107f06eb29082630be6ac4c
SHA10850b438fc1e8b3b8464360cb7f0ecdb95160860
SHA256074177ac9049870fec10c30d11afd9d9fd44829ecb08d298c8fccbe606b1fa94
SHA512791b4d268b9a34b144379f44027fd5be3f87c0d87dc667348f862ffd0b2fb1fbcb03b6b618ac881ce118888aa748ef9bddc488bc3b547980cac01b6268188d7c
-
Filesize
116KB
MD5c4d92ed388bc01a402908d4df96380cd
SHA1b0228af6c59f73ee49e9a2479be4210ee4f4f58f
SHA25652ff370b4dbac609296975de229e3e42b60e5a1b820e9cc5fa9b5208936434bc
SHA5125b8d487570808765b2c7c3494531046d4c979412ab13c7c65ba5f4a2e3902f2c290f5564a87c259866482af01068b822a43d122c396cd182984df583a0340172
-
Filesize
8KB
MD511b6a3126772a27982b2075e2e5b3884
SHA115e234119c23362aec4897eb94fcfe9b9061ce61
SHA2561e6cffaada09e3d52a94b4cab9e2b608271c4387a22c0fe66f7a73fcaf96d1ae
SHA51294f571802466234c5577422fb4116a970b7b6ca8ab024551778e4542591d969f9075357adf62342c5d60722d492650cc9a50443113a3b605c863597ad60f7674