Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6872346b1b51a9e0c9442fb7d4d03969af3ce7e60c1014fab0f35d8e5ca10417.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6872346b1b51a9e0c9442fb7d4d03969af3ce7e60c1014fab0f35d8e5ca10417.exe
-
Size
715.8MB
-
MD5
94b94d3d540398b7a5a3336d70d50194
-
SHA1
ceb17e1848c814f65722b6a4a546f9cb0aedd1d4
-
SHA256
6872346b1b51a9e0c9442fb7d4d03969af3ce7e60c1014fab0f35d8e5ca10417
-
SHA512
bc78d150768cb49dba1a84d18bec356ed7c6f997aa60dc815578a664ee76eeca643841944998b7059a1821fa1157c96201fd38461e23c0c36ae635fea6b3e5dc
-
SSDEEP
1536:Frae78zjORCDGwfdCSog01313pmIs5gf6s1POTQCcdxNqHHzs9lReMbP:LahKyd2n315s5c6s12TQ1NqHHzs9veML
Malware Config
Extracted
purecrypter
https://www.franceconsobanque.fr/wp-admin/images/css/design/fabric/bo/Sjbgpxzi.bmp
Extracted
redline
@gestaslinoff
45.15.157.131:36457
-
auth_value
95adc00b732fc138a3ecc231c485a57a
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/4324-44-0x0000000000400000-0x0000000000432000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation travelpeov.exe -
Executes dropped EXE 3 IoCs
pid Process 4732 travelpeov.exe 5092 travelpeov.exe 4324 travelpeov.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_6872346b1b51a9e0c9442fb7d4d03969af3ce7e60c1014fab0f35d8e5ca10417.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4732 set thread context of 4324 4732 travelpeov.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language travelpeov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language travelpeov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4816 powershell.exe 4816 powershell.exe 4732 travelpeov.exe 4732 travelpeov.exe 536 powershell.exe 536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4732 travelpeov.exe Token: SeDebugPrivilege 4816 powershell.exe Token: SeDebugPrivilege 536 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2068 wrote to memory of 4732 2068 JaffaCakes118_6872346b1b51a9e0c9442fb7d4d03969af3ce7e60c1014fab0f35d8e5ca10417.exe 82 PID 2068 wrote to memory of 4732 2068 JaffaCakes118_6872346b1b51a9e0c9442fb7d4d03969af3ce7e60c1014fab0f35d8e5ca10417.exe 82 PID 2068 wrote to memory of 4732 2068 JaffaCakes118_6872346b1b51a9e0c9442fb7d4d03969af3ce7e60c1014fab0f35d8e5ca10417.exe 82 PID 4732 wrote to memory of 4816 4732 travelpeov.exe 83 PID 4732 wrote to memory of 4816 4732 travelpeov.exe 83 PID 4732 wrote to memory of 4816 4732 travelpeov.exe 83 PID 4732 wrote to memory of 2464 4732 travelpeov.exe 94 PID 4732 wrote to memory of 2464 4732 travelpeov.exe 94 PID 4732 wrote to memory of 2464 4732 travelpeov.exe 94 PID 4732 wrote to memory of 5092 4732 travelpeov.exe 96 PID 4732 wrote to memory of 5092 4732 travelpeov.exe 96 PID 4732 wrote to memory of 5092 4732 travelpeov.exe 96 PID 4732 wrote to memory of 4324 4732 travelpeov.exe 97 PID 4732 wrote to memory of 4324 4732 travelpeov.exe 97 PID 4732 wrote to memory of 4324 4732 travelpeov.exe 97 PID 4732 wrote to memory of 4324 4732 travelpeov.exe 97 PID 4732 wrote to memory of 4324 4732 travelpeov.exe 97 PID 4732 wrote to memory of 4324 4732 travelpeov.exe 97 PID 4732 wrote to memory of 4324 4732 travelpeov.exe 97 PID 4732 wrote to memory of 4324 4732 travelpeov.exe 97 PID 2464 wrote to memory of 536 2464 cmd.exe 98 PID 2464 wrote to memory of 536 2464 cmd.exe 98 PID 2464 wrote to memory of 536 2464 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6872346b1b51a9e0c9442fb7d4d03969af3ce7e60c1014fab0f35d8e5ca10417.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6872346b1b51a9e0c9442fb7d4d03969af3ce7e60c1014fab0f35d8e5ca10417.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\travelpeov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\travelpeov.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\travelpeov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\travelpeov.exe3⤵
- Executes dropped EXE
PID:5092
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\travelpeov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\travelpeov.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5a6d2b5a1acec15769edf3ab0f5a00cb7
SHA1b52d064a8399624f32c0abc008dc8b30896038f3
SHA256f0343dc11542d5eef7a9edc370a05e99620ba8e816f9bdfcda5b8ca4a1835b88
SHA5120e900249ba5ed7f9951396b3f321b25da9723aaeb4b34f9a0927dcaf08b0d8a7929340e57a6aa6a0aa47c73d79d79277e19b77f6eb6412d7d383fcd873645ac2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82