Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 09:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe
-
Size
747.6MB
-
MD5
97deb4fcf4c69ab166fd1301455b5dfa
-
SHA1
0ff0b92ea0c7a7e1a0e9e25415a45afe81731d58
-
SHA256
0823571bf2ec2fe312740dfb557536d1ee59b62e502e81d4e8f577e702514c59
-
SHA512
16d83960c7f4fe98031a13a889a3fa994fe504f7300acb251bb6e819327448da8ff4ddc59ee8efdada34cd025a3e4b89f24a7f89dcd3e6b543338a9da6ab5e9b
-
SSDEEP
12288:BLotIV4X2N9Ogad7pPnJvVKBenSvq33OKjmhI9YSb1jnWLsUmVw3kEun6dHS:Uc4X2TcNpPJdKUiAO8ivMjWLsRV
Malware Config
Extracted
redline
ppiinstall
5.255.103.64:80
-
auth_value
5b4e066b64a55bd70f10196ec142d81e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/452-34-0x0000000000D60000-0x0000000000D88000-memory.dmp family_redline -
Redline family
-
Deletes itself 1 IoCs
pid Process 4936 Brooklyn.exe.pif -
Executes dropped EXE 1 IoCs
pid Process 4936 Brooklyn.exe.pif -
Loads dropped DLL 6 IoCs
pid Process 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 17 iplogger.com 20 iplogger.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2944 tasklist.exe 4808 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4936 set thread context of 452 4936 Brooklyn.exe.pif 103 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Brooklyn.exe.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4640 cmd.exe 4352 PING.EXE 1400 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4352 PING.EXE 1400 PING.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2944 tasklist.exe Token: SeDebugPrivilege 4808 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif 4936 Brooklyn.exe.pif -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3460 wrote to memory of 1860 3460 JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe 82 PID 3460 wrote to memory of 1860 3460 JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe 82 PID 3460 wrote to memory of 1860 3460 JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe 82 PID 3460 wrote to memory of 4640 3460 JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe 83 PID 3460 wrote to memory of 4640 3460 JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe 83 PID 3460 wrote to memory of 4640 3460 JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe 83 PID 4640 wrote to memory of 4604 4640 cmd.exe 85 PID 4640 wrote to memory of 4604 4640 cmd.exe 85 PID 4640 wrote to memory of 4604 4640 cmd.exe 85 PID 4604 wrote to memory of 2944 4604 cmd.exe 86 PID 4604 wrote to memory of 2944 4604 cmd.exe 86 PID 4604 wrote to memory of 2944 4604 cmd.exe 86 PID 4604 wrote to memory of 2556 4604 cmd.exe 87 PID 4604 wrote to memory of 2556 4604 cmd.exe 87 PID 4604 wrote to memory of 2556 4604 cmd.exe 87 PID 4604 wrote to memory of 4808 4604 cmd.exe 89 PID 4604 wrote to memory of 4808 4604 cmd.exe 89 PID 4604 wrote to memory of 4808 4604 cmd.exe 89 PID 4604 wrote to memory of 1584 4604 cmd.exe 90 PID 4604 wrote to memory of 1584 4604 cmd.exe 90 PID 4604 wrote to memory of 1584 4604 cmd.exe 90 PID 4604 wrote to memory of 4660 4604 cmd.exe 91 PID 4604 wrote to memory of 4660 4604 cmd.exe 91 PID 4604 wrote to memory of 4660 4604 cmd.exe 91 PID 4604 wrote to memory of 4936 4604 cmd.exe 92 PID 4604 wrote to memory of 4936 4604 cmd.exe 92 PID 4604 wrote to memory of 4936 4604 cmd.exe 92 PID 4604 wrote to memory of 4352 4604 cmd.exe 93 PID 4604 wrote to memory of 4352 4604 cmd.exe 93 PID 4604 wrote to memory of 4352 4604 cmd.exe 93 PID 4640 wrote to memory of 1400 4640 cmd.exe 94 PID 4640 wrote to memory of 1400 4640 cmd.exe 94 PID 4640 wrote to memory of 1400 4640 cmd.exe 94 PID 4936 wrote to memory of 452 4936 Brooklyn.exe.pif 103 PID 4936 wrote to memory of 452 4936 Brooklyn.exe.pif 103 PID 4936 wrote to memory of 452 4936 Brooklyn.exe.pif 103 PID 4936 wrote to memory of 452 4936 Brooklyn.exe.pif 103 PID 4936 wrote to memory of 452 4936 Brooklyn.exe.pif 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97deb4fcf4c69ab166fd1301455b5dfa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\tapiunattend.exetapiunattend.exe2⤵PID:1860
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Inspector.xlam & ping -n 5 localhost2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AVGUI.exe"4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\SysWOW64\find.exefind /I /N "avgui.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1584
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^rsFkfaUC$" Packed.xlam4⤵
- System Location Discovery: System Language Discovery
PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Brooklyn.exe.pifBrooklyn.exe.pif E4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe5⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 54⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4352
-
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1400
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
11KB
MD562b35fde6c3bd929b14455f42a7aba51
SHA1ca3e32ea3b20d1ffe83189a7bfe4c856c0a64220
SHA256a34ad5c227a3eaccc64273e053b932282188e8132041458d09ec3016e21af84a
SHA512ec9579a596d9e7d398f10c23bbb90daa83f201725488f0248cd33b25271ff52c9a161de5652e37f87f63a10831e5bb148d8a9d4beffdb557d35db29862834ee6
-
Filesize
925KB
MD56e886da9317a2e0ae693d7e5bc6fe832
SHA1df79b26408412284d1af644e7c4f617257d86d63
SHA25667d53fac4523f6621e1033d2ab97a8787fcddba8695fd39626d7186b7b53864b
SHA5125375befe56fa5c53dc860b9b6d2319b2020b3aec2c7130a9e48e43a624f4fe5582667dbe12d740cc6c081bd32301d3790bd1aa6f3991b7d1a6ba5baa766f6b75
-
Filesize
695KB
MD5450f295303a69c7cc5bbf525d1bce8a8
SHA193b69407d3a6281939b782ed6ee739bea92e138d
SHA256f525858ebbba889dd5332628a9b0c7fa0ab69466eb42868205c123bbb82a66d7
SHA512c813f284c24e6df83c8424db5d60bba86b1c987f50d24841536aa0785bf64e2576f81b60c3a145150e2aa7f412c796b86ed21dca27a1a2c2ce700f87ee13611e
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219