Analysis

  • max time kernel
    133s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 16:35

General

  • Target

    JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe

  • Size

    674.3MB

  • MD5

    07957b9ef6cc06aad4c2aa427e497498

  • SHA1

    3f28f77f8a9a3890f3d933317e49b5a99c98b841

  • SHA256

    9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1

  • SHA512

    42fc6df4534922c441453315028261887eafc543317ad521cd177175f8d2011c120c5aa40c03640843460de93ff5368023ccf743ea49a5392a27ecbcf89f117b

  • SSDEEP

    98304:xtYtAE666QfTXGd9rQ52AoipnBNy1cBh8u0++SAqJ:oGE666QX0YPy+Vyq

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/856-5-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/856-15-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/856-18-0x0000000074450000-0x0000000074B3E000-memory.dmp

    Filesize

    6.9MB

  • memory/856-3-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/856-4-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/856-6-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/856-17-0x0000000074450000-0x0000000074B3E000-memory.dmp

    Filesize

    6.9MB

  • memory/856-11-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/856-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/856-16-0x0000000074450000-0x0000000074B3E000-memory.dmp

    Filesize

    6.9MB

  • memory/856-9-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1104-14-0x0000000074450000-0x0000000074B3E000-memory.dmp

    Filesize

    6.9MB

  • memory/1104-0-0x000000007445E000-0x000000007445F000-memory.dmp

    Filesize

    4KB

  • memory/1104-1-0x0000000001080000-0x00000000014CA000-memory.dmp

    Filesize

    4.3MB

  • memory/1104-2-0x0000000074450000-0x0000000074B3E000-memory.dmp

    Filesize

    6.9MB