Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 16:35

General

  • Target

    JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe

  • Size

    674.3MB

  • MD5

    07957b9ef6cc06aad4c2aa427e497498

  • SHA1

    3f28f77f8a9a3890f3d933317e49b5a99c98b841

  • SHA256

    9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1

  • SHA512

    42fc6df4534922c441453315028261887eafc543317ad521cd177175f8d2011c120c5aa40c03640843460de93ff5368023ccf743ea49a5392a27ecbcf89f117b

  • SSDEEP

    98304:xtYtAE666QfTXGd9rQ52AoipnBNy1cBh8u0++SAqJ:oGE666QX0YPy+Vyq

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JaffaCakes118_9dd547056911beff3285e6637f89c761205e679dff2d3680b33bc8a8af885af1.exe.log

    Filesize

    520B

    MD5

    03febbff58da1d3318c31657d89c8542

    SHA1

    c9e017bd9d0a4fe533795b227c855935d86c2092

    SHA256

    5164770a37b199a79ccd23b399bb3309228973d9f74c589bc2623dc613b37ac4

    SHA512

    3750c372bbca1892e9c1b34681d592c693e725a8b149c3d6938079cd467628cec42c4293b0d886b57a786abf45f5e7229247b3445001774e3e793ff5a3accfa3

  • memory/244-9-0x0000000075190000-0x0000000075940000-memory.dmp

    Filesize

    7.7MB

  • memory/244-8-0x0000000008160000-0x00000000081F2000-memory.dmp

    Filesize

    584KB

  • memory/244-17-0x0000000075190000-0x0000000075940000-memory.dmp

    Filesize

    7.7MB

  • memory/244-4-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/244-10-0x0000000001D00000-0x0000000001D0A000-memory.dmp

    Filesize

    40KB

  • memory/244-7-0x0000000075190000-0x0000000075940000-memory.dmp

    Filesize

    7.7MB

  • memory/244-15-0x0000000008200000-0x000000000824C000-memory.dmp

    Filesize

    304KB

  • memory/244-14-0x0000000005C80000-0x0000000005CBC000-memory.dmp

    Filesize

    240KB

  • memory/244-13-0x00000000083D0000-0x00000000084DA000-memory.dmp

    Filesize

    1.0MB

  • memory/244-11-0x00000000092E0000-0x00000000098F8000-memory.dmp

    Filesize

    6.1MB

  • memory/244-12-0x0000000005C20000-0x0000000005C32000-memory.dmp

    Filesize

    72KB

  • memory/1900-1-0x0000000000570000-0x00000000009BA000-memory.dmp

    Filesize

    4.3MB

  • memory/1900-0-0x000000007519E000-0x000000007519F000-memory.dmp

    Filesize

    4KB

  • memory/1900-2-0x0000000005AF0000-0x0000000006094000-memory.dmp

    Filesize

    5.6MB

  • memory/1900-16-0x0000000075190000-0x0000000075940000-memory.dmp

    Filesize

    7.7MB

  • memory/1900-3-0x0000000075190000-0x0000000075940000-memory.dmp

    Filesize

    7.7MB