Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 23:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe
-
Size
4.6MB
-
MD5
f0c79126c7a4dc930ea4e1e4e09017b5
-
SHA1
a47859bef56c268a88405370d9c2556d5a4fb253
-
SHA256
2fa3a2a8cef5c47f46af13eb11cd421f9793a0cba77d8df53c05ff5ead488ee0
-
SHA512
1793661b774bed282551d960653999f65196f03e1bf4360821a08a9b270337b20cdeb998acbb1367c4557c985ca2aec23022f267ec89bdebe3934e004c736769
-
SSDEEP
98304:ALO9E237GJYUl1fe84qbxuGOlg3fD9TY08MsTH1WS3Op:bL2J1u/esTUsw
Malware Config
Extracted
redline
@Bibiskop
176.57.69.148:43862
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0009000000016d1d-57.dat family_redline behavioral1/memory/2868-63-0x00000000008C0000-0x00000000008DE000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0009000000016d1d-57.dat family_sectoprat behavioral1/memory/2868-63-0x00000000008C0000-0x00000000008DE000-memory.dmp family_sectoprat -
Sectoprat family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1648 powershell.exe 2600 powershell.exe 1016 powershell.exe 2964 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 2736 nslockup.exe 2868 svchost.exe 2980 services32.exe 1356 sihost32.exe -
Loads dropped DLL 7 IoCs
pid Process 1932 AppLaunch.exe 1932 AppLaunch.exe 1932 AppLaunch.exe 1372 cmd.exe 1372 cmd.exe 2576 conhost.exe 2576 conhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 raw.githubusercontent.com 14 raw.githubusercontent.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1800 set thread context of 1932 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 996 conhost.exe 1648 powershell.exe 2600 powershell.exe 2576 conhost.exe 2576 conhost.exe 1016 powershell.exe 2964 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2868 svchost.exe Token: SeDebugPrivilege 996 conhost.exe Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 2576 conhost.exe Token: SeDebugPrivilege 1016 powershell.exe Token: SeDebugPrivilege 2964 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1932 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 30 PID 1800 wrote to memory of 1932 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 30 PID 1800 wrote to memory of 1932 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 30 PID 1800 wrote to memory of 1932 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 30 PID 1800 wrote to memory of 1932 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 30 PID 1800 wrote to memory of 1932 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 30 PID 1800 wrote to memory of 1932 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 30 PID 1800 wrote to memory of 1932 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 30 PID 1800 wrote to memory of 1932 1800 JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe 30 PID 1932 wrote to memory of 2736 1932 AppLaunch.exe 31 PID 1932 wrote to memory of 2736 1932 AppLaunch.exe 31 PID 1932 wrote to memory of 2736 1932 AppLaunch.exe 31 PID 1932 wrote to memory of 2736 1932 AppLaunch.exe 31 PID 1932 wrote to memory of 2868 1932 AppLaunch.exe 32 PID 1932 wrote to memory of 2868 1932 AppLaunch.exe 32 PID 1932 wrote to memory of 2868 1932 AppLaunch.exe 32 PID 1932 wrote to memory of 2868 1932 AppLaunch.exe 32 PID 1932 wrote to memory of 2868 1932 AppLaunch.exe 32 PID 1932 wrote to memory of 2868 1932 AppLaunch.exe 32 PID 1932 wrote to memory of 2868 1932 AppLaunch.exe 32 PID 2736 wrote to memory of 996 2736 nslockup.exe 35 PID 2736 wrote to memory of 996 2736 nslockup.exe 35 PID 2736 wrote to memory of 996 2736 nslockup.exe 35 PID 2736 wrote to memory of 996 2736 nslockup.exe 35 PID 996 wrote to memory of 1560 996 conhost.exe 36 PID 996 wrote to memory of 1560 996 conhost.exe 36 PID 996 wrote to memory of 1560 996 conhost.exe 36 PID 1560 wrote to memory of 1648 1560 cmd.exe 38 PID 1560 wrote to memory of 1648 1560 cmd.exe 38 PID 1560 wrote to memory of 1648 1560 cmd.exe 38 PID 996 wrote to memory of 2932 996 conhost.exe 40 PID 996 wrote to memory of 2932 996 conhost.exe 40 PID 996 wrote to memory of 2932 996 conhost.exe 40 PID 2932 wrote to memory of 2368 2932 cmd.exe 42 PID 2932 wrote to memory of 2368 2932 cmd.exe 42 PID 2932 wrote to memory of 2368 2932 cmd.exe 42 PID 1560 wrote to memory of 2600 1560 cmd.exe 43 PID 1560 wrote to memory of 2600 1560 cmd.exe 43 PID 1560 wrote to memory of 2600 1560 cmd.exe 43 PID 996 wrote to memory of 1372 996 conhost.exe 44 PID 996 wrote to memory of 1372 996 conhost.exe 44 PID 996 wrote to memory of 1372 996 conhost.exe 44 PID 1372 wrote to memory of 2980 1372 cmd.exe 46 PID 1372 wrote to memory of 2980 1372 cmd.exe 46 PID 1372 wrote to memory of 2980 1372 cmd.exe 46 PID 2980 wrote to memory of 2576 2980 services32.exe 47 PID 2980 wrote to memory of 2576 2980 services32.exe 47 PID 2980 wrote to memory of 2576 2980 services32.exe 47 PID 2980 wrote to memory of 2576 2980 services32.exe 47 PID 2576 wrote to memory of 2072 2576 conhost.exe 48 PID 2576 wrote to memory of 2072 2576 conhost.exe 48 PID 2576 wrote to memory of 2072 2576 conhost.exe 48 PID 2072 wrote to memory of 1016 2072 cmd.exe 50 PID 2072 wrote to memory of 1016 2072 cmd.exe 50 PID 2072 wrote to memory of 1016 2072 cmd.exe 50 PID 2576 wrote to memory of 1356 2576 conhost.exe 51 PID 2576 wrote to memory of 1356 2576 conhost.exe 51 PID 2576 wrote to memory of 1356 2576 conhost.exe 51 PID 2072 wrote to memory of 2964 2072 cmd.exe 52 PID 2072 wrote to memory of 2964 2072 cmd.exe 52 PID 2072 wrote to memory of 2964 2072 cmd.exe 52 PID 1356 wrote to memory of 1700 1356 sihost32.exe 53 PID 1356 wrote to memory of 1700 1356 sihost32.exe 53 PID 1356 wrote to memory of 1700 1356 sihost32.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\nslockup.exe"C:\Users\Admin\AppData\Local\Temp\nslockup.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\nslockup.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\System32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit5⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Users\Admin\services32.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Users\Admin\services32.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:2368
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\services32.exe"5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\services32.exeC:\Users\Admin\services32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\\conhost.exe" "C:\Users\Admin\services32.exe"7⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\System32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit8⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"9⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"9⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\\conhost.exe" "/sihost32"9⤵PID:1700
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaeb3c6df0dccc6f29da10f55dba328a
SHA10c2ca9252b2f757329e87354dc483f8b133b0ebc
SHA256ae6b8ca0fca31089b6d55bd5ec5ca4f7103db436f6d50add6094efc32fa20c2d
SHA512e89a2980154254504d58499afc4c654ec545e80e1faec2c26840b7401de1ae2912dff87ed969ea22ca0e956da92353dff5931a9d8e1c10653f3f0e1d215a1a0b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
29KB
MD526182c623fc79809e233ad0e1ad95b3f
SHA11cad28253b1ca45a7240f1f8990645f4b375b213
SHA2568e6013e034e8a0f9deceb91c95352326c8c1c9bc4499167220113d497feae9d1
SHA512dd41f05ce98e40e587485866da664c835c9cf2cacffab973a0db6bd9e3822f8727d52f5b8c457261eebdba54fa818348f03c9f00b1ea23ef0d0498e981df8dda
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5481f3f56d8c9d844b852380b84d0d29c
SHA191b56c7aa74c01ff3eda3d43644565a6d7fa5be5
SHA25621ae8244befe4898b3c9512267c43e59bb7a21ea350ebcf9879846998aaf04cd
SHA512d92f8a3fce619a9c54088b31598a9fab5ae8e9dadf6360f9f6deaa3e4cddc62900460da827b124b836bca5a8063258f4290ad9b5ddf0c22250ca4d165852508f
-
Filesize
65KB
MD5e31a6207fa3e1a01653b369e4b470843
SHA1261fcb938445bf37fb11d25de7e30286da7e1d74
SHA256bb40bc63c799bbe25e2a3f1a84c424194bd057dec002ecc5e65b11faa2c98339
SHA512035c66661ced7396973f5d14e68d00024526652f3facd46c6e242d1d60c28e78b7ee59c3b66ba9f7d2126d1bd1dff1534266e52f243dc6d3d6487712ca924ed9
-
Filesize
95KB
MD5561f33e56d85a983df6ec1c78ba85153
SHA16f16876957f4b4711903dd4785b7a034c24240f5
SHA256c117703d313253dbeb48c8db761929f7736affd6477a56113d37227a0b306dbb
SHA5125fdf49a894f6ebd9754e0a146ae27aae2d818af16fd0d3c1734e7794812f7e7936936e7f03b1fd12c80a88762892d9c1144ee6b927f3b46471ac478b60ae59b9