Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe
-
Size
703.6MB
-
MD5
3a6ad662a26c53904a490a5822a46e73
-
SHA1
d3d4e9eeadac043024d2b792343b8383ed3b7aae
-
SHA256
683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b
-
SHA512
a571165b916effb6b48b334b62d231af85569c0540fa37e293d64316aa371870e225aaad493d4433bcdd196202bac262e4d67fbc925cd6ee04d28971297fc1cf
-
SSDEEP
3072:QIdXDNUQazyqWoej+BgKlnsrU4Ze/+LSfKt5aN/MtYatJKgG9NLx:rdTNUQ2W0eKlnsrdZe/qUq5cIHKgG9N
Malware Config
Extracted
redline
6351529797_99
https://pastebin.com/raw/8baCJyMF
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2272-1-0x0000000000020000-0x000000000003E000-memory.dmp family_redline -
Redline family
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 206 pastebin.com 219 pastebin.com 319 pastebin.com 323 pastebin.com 341 pastebin.com 37 pastebin.com 101 pastebin.com 161 pastebin.com 19 pastebin.com 217 pastebin.com 263 pastebin.com 213 pastebin.com 225 pastebin.com 25 pastebin.com 98 pastebin.com 134 pastebin.com 154 pastebin.com 162 pastebin.com 226 pastebin.com 6 pastebin.com 131 pastebin.com 147 pastebin.com 230 pastebin.com 245 pastebin.com 270 pastebin.com 165 pastebin.com 207 pastebin.com 311 pastebin.com 322 pastebin.com 360 pastebin.com 72 pastebin.com 212 pastebin.com 275 pastebin.com 44 pastebin.com 88 pastebin.com 128 pastebin.com 222 pastebin.com 235 pastebin.com 332 pastebin.com 22 pastebin.com 62 pastebin.com 76 pastebin.com 215 pastebin.com 233 pastebin.com 304 pastebin.com 307 pastebin.com 312 pastebin.com 9 pastebin.com 21 pastebin.com 117 pastebin.com 238 pastebin.com 347 pastebin.com 83 pastebin.com 205 pastebin.com 234 pastebin.com 302 pastebin.com 317 pastebin.com 29 pastebin.com 115 pastebin.com 208 pastebin.com 169 pastebin.com 356 pastebin.com 375 pastebin.com 7 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2272 JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2272