Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 13:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2593da293c10bebca0895f0636e56689.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2593da293c10bebca0895f0636e56689.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2593da293c10bebca0895f0636e56689.exe
-
Size
2.3MB
-
MD5
2593da293c10bebca0895f0636e56689
-
SHA1
27201a2d876de5c1fc1b735f0f671398ebc6f2a5
-
SHA256
9e3f93ae0a1f76351b69714917b3f1cd965b09e2e696964b28d693c14f71f007
-
SHA512
fa6d250297cf381d5181a81d8efe319cc2f278383e992d98e72823dd37498cd8d04e43e6c8830995f2d8908e09cc2bcd8d1762cf9a2245f5387b2f317f74c469
-
SSDEEP
49152:u5+hFCrwa4SLwi/MfjOPwm5hIarqMYASJmcmUDLh6ZuWxjwMGxiz8lVHTIioOFZT:u5aFiwc0YwjOPHZ3cm2oZuojexiqZ7H
Malware Config
Extracted
redline
@kissyt
62.182.156.24:12780
-
auth_value
bb67ccc49d44343128ca161d7fe51029
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x00050000000195ff-96.dat family_redline behavioral1/memory/2076-99-0x0000000001150000-0x0000000001170000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 12 IoCs
pid Process 2436 7z.exe 2876 7z.exe 2760 7z.exe 2932 7z.exe 2872 7z.exe 2748 7z.exe 2652 7z.exe 336 7z.exe 2676 7z.exe 1712 7z.exe 1800 7z.exe 2076 bild.exe -
Loads dropped DLL 22 IoCs
pid Process 2072 cmd.exe 2436 7z.exe 2072 cmd.exe 2876 7z.exe 2072 cmd.exe 2760 7z.exe 2072 cmd.exe 2932 7z.exe 2072 cmd.exe 2872 7z.exe 2072 cmd.exe 2748 7z.exe 2072 cmd.exe 2652 7z.exe 2072 cmd.exe 336 7z.exe 2072 cmd.exe 2676 7z.exe 2072 cmd.exe 1712 7z.exe 2072 cmd.exe 1800 7z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2593da293c10bebca0895f0636e56689.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bild.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2076 bild.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeRestorePrivilege 2436 7z.exe Token: 35 2436 7z.exe Token: SeSecurityPrivilege 2436 7z.exe Token: SeSecurityPrivilege 2436 7z.exe Token: SeRestorePrivilege 2876 7z.exe Token: 35 2876 7z.exe Token: SeSecurityPrivilege 2876 7z.exe Token: SeSecurityPrivilege 2876 7z.exe Token: SeRestorePrivilege 2760 7z.exe Token: 35 2760 7z.exe Token: SeSecurityPrivilege 2760 7z.exe Token: SeSecurityPrivilege 2760 7z.exe Token: SeRestorePrivilege 2932 7z.exe Token: 35 2932 7z.exe Token: SeSecurityPrivilege 2932 7z.exe Token: SeSecurityPrivilege 2932 7z.exe Token: SeRestorePrivilege 2872 7z.exe Token: 35 2872 7z.exe Token: SeSecurityPrivilege 2872 7z.exe Token: SeSecurityPrivilege 2872 7z.exe Token: SeRestorePrivilege 2748 7z.exe Token: 35 2748 7z.exe Token: SeSecurityPrivilege 2748 7z.exe Token: SeSecurityPrivilege 2748 7z.exe Token: SeRestorePrivilege 2652 7z.exe Token: 35 2652 7z.exe Token: SeSecurityPrivilege 2652 7z.exe Token: SeSecurityPrivilege 2652 7z.exe Token: SeRestorePrivilege 336 7z.exe Token: 35 336 7z.exe Token: SeSecurityPrivilege 336 7z.exe Token: SeSecurityPrivilege 336 7z.exe Token: SeRestorePrivilege 2676 7z.exe Token: 35 2676 7z.exe Token: SeSecurityPrivilege 2676 7z.exe Token: SeSecurityPrivilege 2676 7z.exe Token: SeRestorePrivilege 1712 7z.exe Token: 35 1712 7z.exe Token: SeSecurityPrivilege 1712 7z.exe Token: SeSecurityPrivilege 1712 7z.exe Token: SeRestorePrivilege 1800 7z.exe Token: 35 1800 7z.exe Token: SeSecurityPrivilege 1800 7z.exe Token: SeSecurityPrivilege 1800 7z.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2072 1956 JaffaCakes118_2593da293c10bebca0895f0636e56689.exe 31 PID 1956 wrote to memory of 2072 1956 JaffaCakes118_2593da293c10bebca0895f0636e56689.exe 31 PID 1956 wrote to memory of 2072 1956 JaffaCakes118_2593da293c10bebca0895f0636e56689.exe 31 PID 1956 wrote to memory of 2072 1956 JaffaCakes118_2593da293c10bebca0895f0636e56689.exe 31 PID 2072 wrote to memory of 1580 2072 cmd.exe 33 PID 2072 wrote to memory of 1580 2072 cmd.exe 33 PID 2072 wrote to memory of 1580 2072 cmd.exe 33 PID 2072 wrote to memory of 2436 2072 cmd.exe 34 PID 2072 wrote to memory of 2436 2072 cmd.exe 34 PID 2072 wrote to memory of 2436 2072 cmd.exe 34 PID 2072 wrote to memory of 2876 2072 cmd.exe 35 PID 2072 wrote to memory of 2876 2072 cmd.exe 35 PID 2072 wrote to memory of 2876 2072 cmd.exe 35 PID 2072 wrote to memory of 2760 2072 cmd.exe 36 PID 2072 wrote to memory of 2760 2072 cmd.exe 36 PID 2072 wrote to memory of 2760 2072 cmd.exe 36 PID 2072 wrote to memory of 2932 2072 cmd.exe 37 PID 2072 wrote to memory of 2932 2072 cmd.exe 37 PID 2072 wrote to memory of 2932 2072 cmd.exe 37 PID 2072 wrote to memory of 2872 2072 cmd.exe 38 PID 2072 wrote to memory of 2872 2072 cmd.exe 38 PID 2072 wrote to memory of 2872 2072 cmd.exe 38 PID 2072 wrote to memory of 2748 2072 cmd.exe 39 PID 2072 wrote to memory of 2748 2072 cmd.exe 39 PID 2072 wrote to memory of 2748 2072 cmd.exe 39 PID 2072 wrote to memory of 2652 2072 cmd.exe 40 PID 2072 wrote to memory of 2652 2072 cmd.exe 40 PID 2072 wrote to memory of 2652 2072 cmd.exe 40 PID 2072 wrote to memory of 336 2072 cmd.exe 41 PID 2072 wrote to memory of 336 2072 cmd.exe 41 PID 2072 wrote to memory of 336 2072 cmd.exe 41 PID 2072 wrote to memory of 2676 2072 cmd.exe 42 PID 2072 wrote to memory of 2676 2072 cmd.exe 42 PID 2072 wrote to memory of 2676 2072 cmd.exe 42 PID 2072 wrote to memory of 1712 2072 cmd.exe 43 PID 2072 wrote to memory of 1712 2072 cmd.exe 43 PID 2072 wrote to memory of 1712 2072 cmd.exe 43 PID 2072 wrote to memory of 1800 2072 cmd.exe 44 PID 2072 wrote to memory of 1800 2072 cmd.exe 44 PID 2072 wrote to memory of 1800 2072 cmd.exe 44 PID 2072 wrote to memory of 1288 2072 cmd.exe 45 PID 2072 wrote to memory of 1288 2072 cmd.exe 45 PID 2072 wrote to memory of 1288 2072 cmd.exe 45 PID 2072 wrote to memory of 2076 2072 cmd.exe 46 PID 2072 wrote to memory of 2076 2072 cmd.exe 46 PID 2072 wrote to memory of 2076 2072 cmd.exe 46 PID 2072 wrote to memory of 2076 2072 cmd.exe 46 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1288 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2593da293c10bebca0895f0636e56689.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2593da293c10bebca0895f0636e56689.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\mode.commode 65,103⤵PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p___________29783pwd19393pwd12772pwd8909pwd27852pwd25744pwd14383___________ -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_10.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_9.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_8.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\system32\attrib.exeattrib +H "bild.exe"3⤵
- Views/modifies file attributes
PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\main\bild.exe"bild.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
2.1MB
MD5b14ec742af218c5e8103c238945b46ba
SHA12fa1b3bf322359750b106e66b7829ea76e029fb6
SHA256c41be9cfd72d0004d68d11beabb25c7c09e5a7c81f49c2004094dfdc681e7889
SHA512fd20d7dcdecbcb2a185c73f248f9c4090d0def62ddda6bcf2f8e891d73faae3ddc4287575dd2bafdf2dc9bb8203ba465883a7d0ca226b22c86e6cc9b12acbf30
-
Filesize
104KB
MD5e34a55a90ff2c71809d41b65cd7817f9
SHA1b93d259f4918264ee7b46a17a5736a59149e6f5f
SHA256ccf645ccd85d91b6a9a01044d72ac8879da021416113a74bb7588e17b06fcd7b
SHA512c101e63333fa364f53835c476f8a299b95da0b6a21673d005bee715c6c3cb66dd3982607ce7b31cb3744c8b1def1d020839ef654ddc82999d25db1c0acedf00d
-
Filesize
43KB
MD5ca18bf83bff029b2ce2729c56fd14199
SHA120249ffe4843d6f925a3a1c6177b9dfeba72d376
SHA256248c00ddcfe789719baac113396e992f00d1757e13b34fadff464a6fb5f22c06
SHA512784b67937cd133aba86e1e8bce7a70cafcba4acd294f51fc3d428b6fb4e1c2f12fb84322e3aeecc8e1830fb136873ee29f37b809a9e757c1630a05cb733c6b7d
-
Filesize
1.6MB
MD58ddef9c49e170a324f348c9eff284966
SHA1d68d0e0ba0bde529d0c079b9d4c681f57b3b29d2
SHA25680113ad4ad151d9725b2deb0c3ac59a984c97803d58217304320bc30fbb341d4
SHA51285d89dc98a9548092ff6a576757f4a7d5d6381a1f74291a342dc8bc6195b7e29a5ca12b7f3a10eb2b6efc5269d5e54d3aa8cb7124c539bfcd035451643bb9508
-
Filesize
43KB
MD5df419191fd93a9bbc5cd1d4bd3b2614f
SHA1d974478d3a2583697b359de6947ea747032daec1
SHA25651a148a77ea6524b71af2febb51a07b872c35fe8feb915f9270e45e5c277150b
SHA5120420423016ee1c8e202a9a4825cc9cf99206fa82517f78612dbd02f6118ceae7805a8cebdfd520ae08e4872295f63d2b0cc9d47feca8e04c63db1cd79c803995
-
Filesize
44KB
MD5b4ab662b21302e8eb0308aaf9b661036
SHA17e0d1de1070410a24c1df82b1fa26074c5d12185
SHA256c333e92b6459f2ad2e940c331414c99a8d5103dd0bf8fa2541c24de6f31540c7
SHA512beeb6edd8752bbb889afba7d915a213709c3408f7741c7e0925ca4db71b44036d0d2589813f42355ec77651e4c1701b9f86915921b0367b42ecdf9619979ce34
-
Filesize
44KB
MD5dd49bf0ebd5df0401177739a932f9d6e
SHA17ead8be5fc5aa2cdcb03981a89de8ba4b8099db9
SHA256ddc18c1d846c84ae6df2b7480ec4df0995d338187c1046fd1ff9b49478e1851f
SHA512befb16ccc817d899b056512c1effe2b757b3b7a9e6afdeea6d7cb594c45a290ea1cf2e8402aa7582d5bb98d48ee02b841aed7f4d39640f67eb62b4c674f3cb8a
-
Filesize
44KB
MD5e7483b41fbfe506f26f1a504b618e819
SHA18ff4c76318765ff3f484f02e8a43c8da3fb548f3
SHA256e01d5e70df82f5725e23d4bc1f4fc460d4482191843bd3ce18d22d655d8be8ce
SHA512358eecef7a4f3443100c83e1eb671218e625e730ef59a6007a750de9e82f85548e29e6bc1e9b50128a23300fe62f88a38e4e7f72defa1ad9515a870a7202ed4c
-
Filesize
44KB
MD53982673f62b6fbbe38c91245bc412f86
SHA16499e8a235610f8c796051815c643d6ff342bfec
SHA256857bfc0873ec950f4b94ec05a880b1f8320a37b364ce58fe915e9576d045bcfe
SHA5123b814381cce232ba27f0d76337b0f63e32cdc0229c0be18e45ae007a41a1798a50963caff7beb6893bdf058a20dcc232ec09d54b041cd090fde2c2dc46f026fb
-
Filesize
44KB
MD5c66ad08af96bd54e50f40fab02994c45
SHA1002ce5ad7a410e5f7dbc739a7d95e274756ffc67
SHA256b71250b48d62e797af001d858f5fd4ce233590837e6edcceee5baa985b5b2d84
SHA512422eb98f889591ebf6edc1934c7b43f3901868ad1149cf9356726b988183ea1e3b853f852c269edf54d765dff11072509560ad352e44293790dea4e842796179
-
Filesize
44KB
MD5a2afcde35ffc208876cc8d05a977a2a9
SHA1e51bd3eadfaf232fa9ead6d2f3bc3c00a96089c6
SHA2567e44a5eb7a9a33b90468a7df349a18c97a743308e386c3e81d0a4a7e8f88c6e5
SHA5128e70df438b6c8e1d7d417f8e8747aa59c980f79a235fb8a0dff1aa8a027fe183625af7fd29aa7f3f80d165fee690a77cb1076bb21e8507ccf1578173ea70a1fa
-
Filesize
44KB
MD565f2772b6505d45a2db6ac742652d8c6
SHA1c13fac816c1dc4637a9b61438c023e1c6ed80637
SHA256b2d4c236439cb879130c4d8458790ea1890d26557ad74a0991c9bfbe8b12a392
SHA512724592163279627c0856e2d2065c338a4f49296e6ee88959af05cfc7709726322a1dc59ac64d6299df41b68ca908a51d71dbdc62e0a74b43eb6fd35ce2a157c2
-
Filesize
1.6MB
MD504f549f38286af52578374a1c2074b89
SHA1dfce157fe1b58dbed9855412b857ba66aed605f4
SHA2567c1eeac03e9218dab57e658fceaf920769f9987fe0dd550aa0a4673715c4a449
SHA51276be6fcdb720096259091c8cacbc3bacd33bc256c1a2455a4cdace85b7e6f689fbb5ef4a2d980a4b7035df0efa6181830633405907c913fb2ddbecbd78276d19
-
Filesize
496B
MD556d6975d2d7a9a569611d984a9ff2edc
SHA1a596f2563ac7a5adcf98a24cc24b468cbd5b1f3f
SHA256274858c65dcdea186e7b3ce7848f10a39e400462fdff4d57e304fd87f0a4de29
SHA512158d7aff224143713995aab34dc1f6538bfde4360c4fab6487924adf11ccc54631ca0c57b8d4a8181518d8f5fdd22af70d161dd6863d578a2f51db822ad67379