Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 09:54

General

  • Target

    JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe

  • Size

    487KB

  • MD5

    1ce49705d8970f5eb961f86feb30529c

  • SHA1

    f83e0f9a4f9548305460349cd32ece0897ec2dcb

  • SHA256

    43e6afa2b5afd7c1f447a4c3ea13ae0de23bfe09b63c753251b653692cbd4b10

  • SHA512

    56914406f52ec41270036389763f1bdb7025a330a0f1c91bbebc114992a51437d7cbc512e53227c0f1c81606a70a3c263eec9bc345df9a04da8052c3e93a0f4e

  • SSDEEP

    12288:Ihxp3lZnT9bD4h3d1yBGIxUyxy4H9KIUfNTq:IJlh9bD4hryBG+GNu

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c OBWH.bat
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Users\Admin\AppData\Roaming\Harold.exe
          Harold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Users\Admin\AppData\Roaming\OBWH.exe
            "C:\Users\Admin\AppData\Roaming\OBWH.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Harold.exe

    Filesize

    358KB

    MD5

    839ed2aba2dc9810a52586c9da5e4ef4

    SHA1

    41d98bc58c253ff1fd6108814ff8f7dfc89fa0b9

    SHA256

    c00c8dc4e32f9b2c95536f5693e646ed74e5b83519017a494d9d985d3cee6f25

    SHA512

    baff6509e9ff2e4ba10f389b02256a6ad58adfc75fa4c6fe61c7626c3c59106f14bca246bd0135605ed40d9d90b59f32d8f07c507b2c333283421a3684de6f86

  • C:\Users\Admin\AppData\Roaming\OBWH.bat

    Filesize

    84B

    MD5

    3d626ae8c552df11ee91e052aeba3ca1

    SHA1

    66dca5c00f1f65c0321b1da5adf00007911ff1a7

    SHA256

    e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14

    SHA512

    2530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e

  • C:\Users\Admin\AppData\Roaming\OBWH.vbs

    Filesize

    258B

    MD5

    9a7cb355df15c81dce0da9c4d80153c3

    SHA1

    fa751fc895955de261043b04310a61e2956dfb59

    SHA256

    e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43

    SHA512

    59470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d

  • \Users\Admin\AppData\Roaming\OBWH.exe

    Filesize

    243KB

    MD5

    931bbe247f09588ad9bb8bee51a4e9ae

    SHA1

    492c8fbf06b266968411a655ad38cf12f5af5970

    SHA256

    beca6f0631cfc692f80825083b2e1428b3a76164ff26bccf5b495f99ba083877

    SHA512

    fd677aa16ab6fb5cae42eeef698fc387e18191caaf4bb1458e746d776aa57c9e7ec78d106e0ee1d1cca8e2aa2d068cb93a11931cbb80a604e8aa67f1e8f4b2c7

  • memory/2548-29-0x0000000000BD0000-0x0000000000C10000-memory.dmp

    Filesize

    256KB

  • memory/2548-30-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB