Analysis

  • max time kernel
    154s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 18:50

General

  • Target

    JaffaCakes118_f0e53d673c00cc9290bf47e07f440a930f6d7c3d3fe7c945b104f170ce4a2331.exe

  • Size

    1020.5MB

  • MD5

    d0db4d5616a8fcf1e8a97506219ad057

  • SHA1

    31c352deab482578de3f1ca903b568e8c8ef50c4

  • SHA256

    f0e53d673c00cc9290bf47e07f440a930f6d7c3d3fe7c945b104f170ce4a2331

  • SHA512

    75e32231f0212e0c6c9d891de3d54ba755c53d2507670f6de5b36ba65abda0068f9e21e98afa657c2ffd499e4892997c0b493b6878b37fd9cc8153f5a5e770bc

  • SSDEEP

    25165824:DqsJYnUrg1vosRY8rm+YSiC7yFq1uZRfqZOvPrDiZH9iP:ZYnYaVa+FiCWOuZoZOvPrae

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f0e53d673c00cc9290bf47e07f440a930f6d7c3d3fe7c945b104f170ce4a2331.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f0e53d673c00cc9290bf47e07f440a930f6d7c3d3fe7c945b104f170ce4a2331.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1164-0-0x000000000041C000-0x000000000041E000-memory.dmp

    Filesize

    8KB

  • memory/1164-1-0x00000000021E0000-0x000000000223A000-memory.dmp

    Filesize

    360KB

  • memory/1164-5-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/1164-6-0x00000000070C0000-0x0000000007664000-memory.dmp

    Filesize

    5.6MB

  • memory/1164-7-0x0000000007670000-0x0000000007702000-memory.dmp

    Filesize

    584KB

  • memory/1164-8-0x00000000025A0000-0x00000000025AA000-memory.dmp

    Filesize

    40KB

  • memory/1164-9-0x00000000078C0000-0x0000000007ED8000-memory.dmp

    Filesize

    6.1MB

  • memory/1164-10-0x0000000007860000-0x0000000007872000-memory.dmp

    Filesize

    72KB

  • memory/1164-11-0x0000000007EE0000-0x0000000007FEA000-memory.dmp

    Filesize

    1.0MB

  • memory/1164-12-0x0000000007FF0000-0x000000000802C000-memory.dmp

    Filesize

    240KB

  • memory/1164-13-0x0000000008060000-0x00000000080AC000-memory.dmp

    Filesize

    304KB

  • memory/1164-14-0x000000000041C000-0x000000000041E000-memory.dmp

    Filesize

    8KB