Analysis

  • max time kernel
    135s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2024, 17:59

General

  • Target

    JaffaCakes118_0823571bf2ec2fe312740dfb557536d1ee59b62e502e81d4e8f577e702514c59.exe

  • Size

    747.6MB

  • MD5

    97deb4fcf4c69ab166fd1301455b5dfa

  • SHA1

    0ff0b92ea0c7a7e1a0e9e25415a45afe81731d58

  • SHA256

    0823571bf2ec2fe312740dfb557536d1ee59b62e502e81d4e8f577e702514c59

  • SHA512

    16d83960c7f4fe98031a13a889a3fa994fe504f7300acb251bb6e819327448da8ff4ddc59ee8efdada34cd025a3e4b89f24a7f89dcd3e6b543338a9da6ab5e9b

  • SSDEEP

    12288:BLotIV4X2N9Ogad7pPnJvVKBenSvq33OKjmhI9YSb1jnWLsUmVw3kEun6dHS:Uc4X2TcNpPJdKUiAO8ivMjWLsRV

Malware Config

Extracted

Family

redline

Botnet

ppiinstall

C2

5.255.103.64:80

Attributes
  • auth_value

    5b4e066b64a55bd70f10196ec142d81e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0823571bf2ec2fe312740dfb557536d1ee59b62e502e81d4e8f577e702514c59.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0823571bf2ec2fe312740dfb557536d1ee59b62e502e81d4e8f577e702514c59.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\tapiunattend.exe
      tapiunattend.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2888
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c cmd < Inspector.xlam & ping -n 5 localhost
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\SysWOW64\cmd.exe
        cmd
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "imagename eq AvastUI.exe"
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2612
        • C:\Windows\SysWOW64\find.exe
          find /I /N "avastui.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2088
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "imagename eq AVGUI.exe"
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1948
        • C:\Windows\SysWOW64\find.exe
          find /I /N "avgui.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2236
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V /R "^rsFkfaUC$" Packed.xlam
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2244
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Brooklyn.exe.pif
          Brooklyn.exe.pif E
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1940
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2032
        • C:\Windows\SysWOW64\PING.EXE
          ping localhost -n 5
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2160
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 5 localhost
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Inspector.xlam

          Filesize

          11KB

          MD5

          62b35fde6c3bd929b14455f42a7aba51

          SHA1

          ca3e32ea3b20d1ffe83189a7bfe4c856c0a64220

          SHA256

          a34ad5c227a3eaccc64273e053b932282188e8132041458d09ec3016e21af84a

          SHA512

          ec9579a596d9e7d398f10c23bbb90daa83f201725488f0248cd33b25271ff52c9a161de5652e37f87f63a10831e5bb148d8a9d4beffdb557d35db29862834ee6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Packed.xlam

          Filesize

          925KB

          MD5

          6e886da9317a2e0ae693d7e5bc6fe832

          SHA1

          df79b26408412284d1af644e7c4f617257d86d63

          SHA256

          67d53fac4523f6621e1033d2ab97a8787fcddba8695fd39626d7186b7b53864b

          SHA512

          5375befe56fa5c53dc860b9b6d2319b2020b3aec2c7130a9e48e43a624f4fe5582667dbe12d740cc6c081bd32301d3790bd1aa6f3991b7d1a6ba5baa766f6b75

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Recipe.xlam

          Filesize

          695KB

          MD5

          450f295303a69c7cc5bbf525d1bce8a8

          SHA1

          93b69407d3a6281939b782ed6ee739bea92e138d

          SHA256

          f525858ebbba889dd5332628a9b0c7fa0ab69466eb42868205c123bbb82a66d7

          SHA512

          c813f284c24e6df83c8424db5d60bba86b1c987f50d24841536aa0785bf64e2576f81b60c3a145150e2aa7f412c796b86ed21dca27a1a2c2ce700f87ee13611e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Brooklyn.exe.pif

          Filesize

          925KB

          MD5

          0adb9b817f1df7807576c2d7068dd931

          SHA1

          4a1b94a9a5113106f40cd8ea724703734d15f118

          SHA256

          98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

          SHA512

          883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\UiFrOPXxH.dll

          Filesize

          1.2MB

          MD5

          d124f55b9393c976963407dff51ffa79

          SHA1

          2c7bbedd79791bfb866898c85b504186db610b5d

          SHA256

          ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

          SHA512

          278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

        • memory/2032-49-0x00000000001C0000-0x00000000001E8000-memory.dmp

          Filesize

          160KB

        • memory/2032-56-0x00000000001C0000-0x00000000001E8000-memory.dmp

          Filesize

          160KB

        • memory/2032-55-0x00000000001C0000-0x00000000001E8000-memory.dmp

          Filesize

          160KB