Analysis

  • max time kernel
    130s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 10:03

General

  • Target

    f37bc82cabddf6a2435471b1ccaabd28_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    f37bc82cabddf6a2435471b1ccaabd28

  • SHA1

    c059334d7becada6015d5ee98f14fd5a7e35b03e

  • SHA256

    85273b02df3b1611648f0187d890fbbefed5865f93453af003a18e8729b1e627

  • SHA512

    adec9695688c782148c39f215efbae6d07cd139317e34c51658640de251c5cbb03db8a0e8635fbc5a682e85c29ad41826cc71d548bfdfc7ade714a33ac7a5026

  • SSDEEP

    24576:RSLXvGxcpX6vR5lqSTx3QnPypPBwijZ4XyKFO1uY7m5HQYk:6OaYZ5jQn6VBwid4XyuqRyk

Malware Config

Extracted

Family

redline

Botnet

felix1008

C2

193.188.22.4:45689

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f37bc82cabddf6a2435471b1ccaabd28_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f37bc82cabddf6a2435471b1ccaabd28_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Windows\SysWOW64\dllhost.exe
      "C:\Windows\System32\dllhost.exe"
      2⤵
        PID:4340
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < Sia.tiff
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4820
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1804
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^pkGGAfikiUHgkUsEdYECSyCYSsHNpFrexxWaHUdYNNqBjTuNBNmlmGvtIHOoIxwBQETRXZXvIGOytwLYlTkcySDOYSJZuidzLnLI$" Sai.tiff
            4⤵
            • System Location Discovery: System Language Discovery
            PID:5096
          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Orlo.exe.com
            Orlo.exe.com S
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3064
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Orlo.exe.com
              C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Orlo.exe.com S
              5⤵
              • Drops startup file
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:3800
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:1240
          • C:\Windows\SysWOW64\PING.EXE
            ping localhost -n 30
            4⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ecco.tiff

      Filesize

      100KB

      MD5

      e5586082ef5f474be6408a7f3b4dba77

      SHA1

      bedc7dc1f81ec8e0d2b7f9228d514ba91a056672

      SHA256

      e8a043bfe68012258f2e515115be252e9ae696f91450a84e54ace974772e841d

      SHA512

      8fcb62fd7af977921b340d8fc3b86556a53180d89fa821faefdaa8b6ab8b5fa243ca70add3aade89a1035ad1cd3983680da96cf78a87410d0827c41e4aeab6ff

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Nevi.tiff

      Filesize

      1002KB

      MD5

      6beecd000f42fe9cb8bd0c042b84fafc

      SHA1

      740230eaecb0ff247e92ab677058ccbc120a54be

      SHA256

      394081a2521b6385d9f891968f09a05ceb61607d1ea75d73acc4b64eebf0aaec

      SHA512

      55fa29db5ae50c8cfd8d5c404c6122706d5840ade656fabe40e7eb3ff15328b6c125ed9e800775a4895e87b7cdf673aafb4a754c302102ce574e46686a22ee1f

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Orlo.exe.com

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe

      Filesize

      63KB

      MD5

      0d5df43af2916f47d00c1573797c1a13

      SHA1

      230ab5559e806574d26b4c20847c368ed55483b0

      SHA256

      c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

      SHA512

      f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sai.tiff

      Filesize

      872KB

      MD5

      c548167b92d99e28335d53bcda495ecc

      SHA1

      8ebf6fc6ca98c2fa60d86ed23030bfeb3b5ba0a5

      SHA256

      3e9fe6e7b34e3753b8e15fe74dc5e099dcfc539ac68f6289dcf7f9c196366847

      SHA512

      993f8ff409133e536546bfe39f403ebe34d324864f893cc79d21104b5ab016745ec91ae912e51475a5883ab1ce868a2f9a9a144b0dc79ce6c06007092fef3f7b

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sia.tiff

      Filesize

      569B

      MD5

      fd6bbedf4b9866258583735e2a2780d5

      SHA1

      f3678efe689afedd82272ca150d51c42338fe838

      SHA256

      68ccc09ad10c2820740db49e6238dc3373f24248920b2a776520fd5dd819fee0

      SHA512

      6ed3175f419a3036ed35da7772e0dfbf36358c6c0f73a351b3ac05d68ff39a6a70241d7dd293a14f0910b6502d97b93591b1ddbecaf4bd59a82d3691f73925bc

    • memory/1240-29-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1240-32-0x0000000005D20000-0x0000000006338000-memory.dmp

      Filesize

      6.1MB

    • memory/1240-33-0x0000000003290000-0x00000000032A2000-memory.dmp

      Filesize

      72KB

    • memory/1240-34-0x0000000005740000-0x000000000577C000-memory.dmp

      Filesize

      240KB

    • memory/1240-35-0x0000000005780000-0x00000000057CC000-memory.dmp

      Filesize

      304KB

    • memory/1240-36-0x00000000059F0000-0x0000000005AFA000-memory.dmp

      Filesize

      1.0MB