Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 03:30

General

  • Target

    JaffaCakes118_0bd4dae28b60c106ca2bf9da5e0e55a0.exe

  • Size

    383KB

  • MD5

    0bd4dae28b60c106ca2bf9da5e0e55a0

  • SHA1

    5a699e5c535e56028a901d3b34175db68c369d97

  • SHA256

    1b67816993c0da768b996b377f214fcffe8e831e98bcae28ca1f87c8204ad358

  • SHA512

    966b52eecf03f5eb9f24f6b7274cc96b5d5b099e7a99ca6a66b42c11498ff3ca0be01f515ebd4792f4ea62623fe1754376d86c91206f02ad26861b4bf73113a3

  • SSDEEP

    6144:G29XY1Hq1AlaqaoAVzfeOHavspTulZfW4OcjmvXZjSxa:t9XCHeAlaqaohOHavspTulZfW4Ocjmv7

Malware Config

Extracted

Family

redline

Botnet

jjfuck

C2

135.181.129.119:4805

Attributes
  • auth_value

    b69102cdbd4afe2d3159f88fb6dac731

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bd4dae28b60c106ca2bf9da5e0e55a0.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bd4dae28b60c106ca2bf9da5e0e55a0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bd4dae28b60c106ca2bf9da5e0e55a0.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bd4dae28b60c106ca2bf9da5e0e55a0.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1924-0-0x000000007415E000-0x000000007415F000-memory.dmp

    Filesize

    4KB

  • memory/1924-1-0x0000000000AE0000-0x0000000000B46000-memory.dmp

    Filesize

    408KB

  • memory/1924-2-0x0000000074150000-0x000000007483E000-memory.dmp

    Filesize

    6.9MB

  • memory/1924-17-0x0000000074150000-0x000000007483E000-memory.dmp

    Filesize

    6.9MB

  • memory/2392-9-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2392-12-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2392-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2392-7-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2392-5-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2392-14-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2392-3-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2392-19-0x0000000074150000-0x000000007483E000-memory.dmp

    Filesize

    6.9MB

  • memory/2392-18-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2392-20-0x0000000074150000-0x000000007483E000-memory.dmp

    Filesize

    6.9MB

  • memory/2392-21-0x0000000074150000-0x000000007483E000-memory.dmp

    Filesize

    6.9MB