Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 21:35
Behavioral task
behavioral1
Sample
JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe
-
Size
781.0MB
-
MD5
68e781523950bf814b9f274a3894783f
-
SHA1
627db70d427864cc598cbb0cc0642c5113260a11
-
SHA256
f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419
-
SHA512
eda6b468f08f60bda2dd5bac93364a43c3ce604a0a12a8084ecdc1e01076418b035359ae440b38703cb0bc11be358d46bb6e54c208d2fe61a18d7931f49c9000
-
SSDEEP
196608:j7z7bJtJ/GgR0tc0A9rY3mq700agl/4H0WH8:/B/3gc5VYnragl4HF
Malware Config
Extracted
redline
me
178.159.39.23:22817
-
auth_value
0b41ed1bdf04c7505d47398771081370
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/396-14-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Redline family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe -
resource yara_rule behavioral2/memory/2996-9-0x0000000000BE0000-0x0000000001584000-memory.dmp themida behavioral2/memory/2996-10-0x0000000000BE0000-0x0000000001584000-memory.dmp themida behavioral2/memory/2996-25-0x0000000000BE0000-0x0000000001584000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2996 set thread context of 396 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2996 wrote to memory of 396 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe 89 PID 2996 wrote to memory of 396 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe 89 PID 2996 wrote to memory of 396 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe 89 PID 2996 wrote to memory of 396 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe 89 PID 2996 wrote to memory of 396 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe 89 PID 2996 wrote to memory of 396 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe 89 PID 2996 wrote to memory of 396 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe 89 PID 2996 wrote to memory of 396 2996 JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f5e18446e95d13433bb0dc7b7965ab21cc1d884bc754424c1dcd2ea48f57f419.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:396
-