Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 21:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe
-
Size
349KB
-
MD5
378088eee28e38af84b75eb9dcf671aa
-
SHA1
c091d335658edd3ceb9255ecd7eccc086cbae25e
-
SHA256
345e261754c2653003e6a59a03a6f7b20a487785f8420366735c641270e1cada
-
SHA512
6df2f5c354654dd794b326425c035690045eb40bdb489058295d9ef4a5068fd0bfc006006ad72701660bd83bcaeae775b2116c8da6fe38d32a3a02b161e44881
-
SSDEEP
6144:QUSw3fbq4a6LKXpzdKgneetfFqJTTiabAOPSW7N88e5Qx3e9+D8:Q5w3fbq4a6Lap7CTR+0OsD8
Malware Config
Extracted
redline
@roxiq1337
164.132.202.45:20588
-
auth_value
3e9eda97b6589ac15756de0ba010d48f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/2340-3-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2340-10-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2340-11-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/memory/2340-3-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2340-10-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat behavioral1/memory/2340-11-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1928 set thread context of 2340 1928 JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2340 1928 JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe 31 PID 1928 wrote to memory of 2340 1928 JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe 31 PID 1928 wrote to memory of 2340 1928 JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe 31 PID 1928 wrote to memory of 2340 1928 JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe 31 PID 1928 wrote to memory of 2340 1928 JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe 31 PID 1928 wrote to memory of 2340 1928 JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe 31 PID 1928 wrote to memory of 2340 1928 JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe 31 PID 1928 wrote to memory of 2340 1928 JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe 31 PID 1928 wrote to memory of 2340 1928 JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_378088eee28e38af84b75eb9dcf671aa.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2340
-