Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 01:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_41a71de0c5ccd5049e536d832c48188d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_41a71de0c5ccd5049e536d832c48188d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_41a71de0c5ccd5049e536d832c48188d.exe
-
Size
447KB
-
MD5
41a71de0c5ccd5049e536d832c48188d
-
SHA1
17fce39c01685c5e6ddc846179123ff64575e078
-
SHA256
a22663cd3d9403bf6d16a7b8433b3f4f4e6f21c55c2ab3dade5d7eebd0c478de
-
SHA512
a13d99af6b09dcf8a210c67f18eb1e091c06826b9b6f00b3729cd65423e8674f4b0cda73a14addc0aeac70c26a65e988e0a918521b0d55ade7d794c28872829b
-
SSDEEP
12288:IcSLM9blew+3GtHSZuECh8JZLOjpLA7bVq2Nfs:GwlzpSBCsROjqhs
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/4624-4-0x0000000003710000-0x0000000003756000-memory.dmp family_redline behavioral2/memory/4624-7-0x00000000037B0000-0x00000000037F4000-memory.dmp family_redline -
Redline family
-
Program crash 2 IoCs
pid pid_target Process procid_target 868 4624 WerFault.exe 83 1052 4624 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_41a71de0c5ccd5049e536d832c48188d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41a71de0c5ccd5049e536d832c48188d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41a71de0c5ccd5049e536d832c48188d.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 11442⤵
- Program crash
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 11642⤵
- Program crash
PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4624 -ip 46241⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4624 -ip 46241⤵PID:3976