Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe
-
Size
703.6MB
-
MD5
3a6ad662a26c53904a490a5822a46e73
-
SHA1
d3d4e9eeadac043024d2b792343b8383ed3b7aae
-
SHA256
683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b
-
SHA512
a571165b916effb6b48b334b62d231af85569c0540fa37e293d64316aa371870e225aaad493d4433bcdd196202bac262e4d67fbc925cd6ee04d28971297fc1cf
-
SSDEEP
3072:QIdXDNUQazyqWoej+BgKlnsrU4Ze/+LSfKt5aN/MtYatJKgG9NLx:rdTNUQ2W0eKlnsrdZe/qUq5cIHKgG9N
Malware Config
Extracted
redline
6351529797_99
https://pastebin.com/raw/8baCJyMF
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4220-1-0x00000000001C0000-0x00000000001DE000-memory.dmp family_redline -
Redline family
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 1089 pastebin.com 198 pastebin.com 290 pastebin.com 327 pastebin.com 845 pastebin.com 908 pastebin.com 1056 pastebin.com 854 pastebin.com 1135 pastebin.com 147 pastebin.com 430 pastebin.com 562 pastebin.com 608 pastebin.com 694 pastebin.com 819 pastebin.com 1201 pastebin.com 894 pastebin.com 961 pastebin.com 173 pastebin.com 186 pastebin.com 295 pastebin.com 602 pastebin.com 643 pastebin.com 847 pastebin.com 280 pastebin.com 472 pastebin.com 671 pastebin.com 1300 pastebin.com 452 pastebin.com 520 pastebin.com 604 pastebin.com 615 pastebin.com 658 pastebin.com 1255 pastebin.com 556 pastebin.com 885 pastebin.com 1054 pastebin.com 1057 pastebin.com 1071 pastebin.com 1237 pastebin.com 429 pastebin.com 546 pastebin.com 687 pastebin.com 1016 pastebin.com 1165 pastebin.com 1211 pastebin.com 117 pastebin.com 140 pastebin.com 620 pastebin.com 717 pastebin.com 981 pastebin.com 32 pastebin.com 164 pastebin.com 868 pastebin.com 1210 pastebin.com 948 pastebin.com 1256 pastebin.com 374 pastebin.com 409 pastebin.com 624 pastebin.com 736 pastebin.com 793 pastebin.com 882 pastebin.com 368 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4220 JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_683ba2a722b30d2cb9998b8769592a96f320bca1b58fbfe24539f78ccdef3b8b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4220