Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2024, 02:25 UTC

General

  • Target

    JaffaCakes118_010b24550d45e9864a47324d0cfbe587.exe

  • Size

    369KB

  • MD5

    010b24550d45e9864a47324d0cfbe587

  • SHA1

    f29b91411dc521108a67809472899a8878a788a4

  • SHA256

    38ef1f7a243e9cdafc4585e6b6396b0b077c7e212d8bcab4b2310de159208a8a

  • SHA512

    39d6c35fc3738bbbe6d7b6c503c9521e84aec7491b1a3d707d8f18a1d5288b24dff1f6b3a035942efd80039e38fe3ac5e1402972b3459a77e275fec75ad55e82

  • SSDEEP

    6144:s4+PN7LF/L0WtxMIEXPS8vvmh/WrQ5C2/4EGOekGQR0BuY:s4+PBLRftxpEXq8veh/P57GOekGQRrY

Malware Config

Extracted

Family

redline

Botnet

sewPalp

C2

185.215.113.29:24645

Attributes
  • auth_value

    41d3df6d093b1e36993abf16af0d6f2d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_010b24550d45e9864a47324d0cfbe587.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_010b24550d45e9864a47324d0cfbe587.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5012

Network

  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    72.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    72.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    200.163.202.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.163.202.172.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    21.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    21.236.111.52.in-addr.arpa
    IN PTR
    Response
  • 185.215.113.29:24645
    JaffaCakes118_010b24550d45e9864a47324d0cfbe587.exe
    260 B
    5
  • 185.215.113.29:24645
    JaffaCakes118_010b24550d45e9864a47324d0cfbe587.exe
    260 B
    5
  • 185.215.113.29:24645
    JaffaCakes118_010b24550d45e9864a47324d0cfbe587.exe
    260 B
    5
  • 185.215.113.29:24645
    JaffaCakes118_010b24550d45e9864a47324d0cfbe587.exe
    260 B
    5
  • 185.215.113.29:24645
    JaffaCakes118_010b24550d45e9864a47324d0cfbe587.exe
    260 B
    5
  • 185.215.113.29:24645
    JaffaCakes118_010b24550d45e9864a47324d0cfbe587.exe
    260 B
    5
  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    72.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    72.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    200.163.202.172.in-addr.arpa
    dns
    74 B
    160 B
    1
    1

    DNS Request

    200.163.202.172.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    21.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    21.236.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5012-1-0x0000000001910000-0x0000000001A10000-memory.dmp

    Filesize

    1024KB

  • memory/5012-2-0x0000000003430000-0x0000000003460000-memory.dmp

    Filesize

    192KB

  • memory/5012-3-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/5012-4-0x00000000036A0000-0x00000000036C4000-memory.dmp

    Filesize

    144KB

  • memory/5012-5-0x0000000000400000-0x00000000016CF000-memory.dmp

    Filesize

    18.8MB

  • memory/5012-6-0x0000000006000000-0x00000000065A4000-memory.dmp

    Filesize

    5.6MB

  • memory/5012-7-0x0000000003740000-0x0000000003762000-memory.dmp

    Filesize

    136KB

  • memory/5012-8-0x00000000065B0000-0x0000000006BC8000-memory.dmp

    Filesize

    6.1MB

  • memory/5012-9-0x0000000003950000-0x0000000003962000-memory.dmp

    Filesize

    72KB

  • memory/5012-10-0x0000000005E80000-0x0000000005F8A000-memory.dmp

    Filesize

    1.0MB

  • memory/5012-11-0x0000000005F90000-0x0000000005FCC000-memory.dmp

    Filesize

    240KB

  • memory/5012-12-0x0000000006BD0000-0x0000000006C1C000-memory.dmp

    Filesize

    304KB

  • memory/5012-13-0x0000000001910000-0x0000000001A10000-memory.dmp

    Filesize

    1024KB

  • memory/5012-14-0x0000000003430000-0x0000000003460000-memory.dmp

    Filesize

    192KB

  • memory/5012-15-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.