Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 12:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe
-
Size
7.3MB
-
MD5
c884991c01d2854cd2d9b46f792207fc
-
SHA1
3f1549e8aaea2119361caa588d47de42aab0dc47
-
SHA256
914644da1b2f5c041a3199411b353f3c8e5b7e965399ac015bbc6c5286da7a7e
-
SHA512
0fade5bc588ea78f9dc589ca2c1223ae6141e6eae3af92a7d660f5343ebfb798b6de1c6011f52061ef2a2cc29800615420dbaaa68b7fac3f10b6a0a0a6da9669
-
SSDEEP
196608:9dm5Fdkyzf/xH8YRE4iQOr3asgZ9QHfz1afuVClmlB:9gPuybp5E4zO9Rc5ly
Malware Config
Extracted
loaderbot
http://qqpe4eb7.beget.tech/cmd.php
Extracted
redline
@zenvolord
185.209.22.181:29234
-
auth_value
5a0918bd3e8ede8e02c8dd9d106a996d
Signatures
-
Loaderbot family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1028-39-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
Xmrig family
-
LoaderBot executable 3 IoCs
resource yara_rule behavioral2/memory/4088-26-0x00000000007C0000-0x0000000000FC0000-memory.dmp loaderbot behavioral2/memory/4088-25-0x00000000007C0000-0x0000000000FC0000-memory.dmp loaderbot behavioral2/memory/4088-54-0x00000000007C0000-0x0000000000FC0000-memory.dmp loaderbot -
XMRig Miner payload 3 IoCs
resource yara_rule behavioral2/memory/4088-26-0x00000000007C0000-0x0000000000FC0000-memory.dmp xmrig behavioral2/memory/4088-25-0x00000000007C0000-0x0000000000FC0000-memory.dmp xmrig behavioral2/memory/4088-54-0x00000000007C0000-0x0000000000FC0000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url dllhost.exe -
Executes dropped EXE 2 IoCs
pid Process 4088 dllhost.exe 1504 VAPE V4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\dllhost.exe" dllhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4088 dllhost.exe 4088 dllhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1504 set thread context of 1028 1504 VAPE V4.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3944 1504 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAPE V4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1504 VAPE V4.exe 1504 VAPE V4.exe 1504 VAPE V4.exe 1504 VAPE V4.exe 4088 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4088 dllhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4088 dllhost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2288 wrote to memory of 4088 2288 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 82 PID 2288 wrote to memory of 4088 2288 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 82 PID 2288 wrote to memory of 4088 2288 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 82 PID 2288 wrote to memory of 1504 2288 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 83 PID 2288 wrote to memory of 1504 2288 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 83 PID 2288 wrote to memory of 1504 2288 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 83 PID 1504 wrote to memory of 1028 1504 VAPE V4.exe 84 PID 1504 wrote to memory of 1028 1504 VAPE V4.exe 84 PID 1504 wrote to memory of 1028 1504 VAPE V4.exe 84 PID 1504 wrote to memory of 1028 1504 VAPE V4.exe 84 PID 1504 wrote to memory of 1028 1504 VAPE V4.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\dllhost.exe"C:\Users\Admin\AppData\Local\Temp\dllhost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\VAPE V4.exe"C:\Users\Admin\AppData\Local\Temp\VAPE V4.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 2283⤵
- Program crash
PID:3944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1504 -ip 15041⤵PID:4384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD5eda712f5cca6547e36d2937b9d89fad0
SHA1fb036b0995196539788ad0bcbce0bbb8d2db448e
SHA256860eabc945b4a99255e1bdbcfcc19a6ebf605612d809678ecd329e6f17c4f961
SHA5125ba2ea554cd25c2931a56bfdfd20da2c064c316841d5506178e44591fd67d356595a8a1d8243df753d2691de3e4e9b6bdeb6b979cbc72894f03c07b048aad6a7
-
Filesize
2.7MB
MD5d3b312dc4459edae7159835bcd374b9f
SHA1c4005eeae71227993aa8ddb05ef0fb0816568c25
SHA2564b515944cfb60f4fa648b09cd4f2556c3d77c381189f5e85fd6b6d9e20a974fd
SHA512019b87178e7051970b9868e37343e25e8a5875356b1a7053fee9eb80ff707195d06b8eae35faba066edfc463628f3298368964ab19a49e81d43c7a7fb2b29786