Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 09:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe
-
Size
487KB
-
MD5
1ce49705d8970f5eb961f86feb30529c
-
SHA1
f83e0f9a4f9548305460349cd32ece0897ec2dcb
-
SHA256
43e6afa2b5afd7c1f447a4c3ea13ae0de23bfe09b63c753251b653692cbd4b10
-
SHA512
56914406f52ec41270036389763f1bdb7025a330a0f1c91bbebc114992a51437d7cbc512e53227c0f1c81606a70a3c263eec9bc345df9a04da8052c3e93a0f4e
-
SSDEEP
12288:Ihxp3lZnT9bD4h3d1yBGIxUyxy4H9KIUfNTq:IJlh9bD4hryBG+GNu
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016d40-18.dat family_redline behavioral1/memory/2548-29-0x0000000000BD0000-0x0000000000C10000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2576 Harold.exe 2548 OBWH.exe -
Loads dropped DLL 4 IoCs
pid Process 2584 cmd.exe 2576 Harold.exe 2576 Harold.exe 2576 Harold.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OBWH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Harold.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2684 2772 JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe 30 PID 2772 wrote to memory of 2684 2772 JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe 30 PID 2772 wrote to memory of 2684 2772 JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe 30 PID 2772 wrote to memory of 2684 2772 JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe 30 PID 2684 wrote to memory of 2584 2684 WScript.exe 31 PID 2684 wrote to memory of 2584 2684 WScript.exe 31 PID 2684 wrote to memory of 2584 2684 WScript.exe 31 PID 2684 wrote to memory of 2584 2684 WScript.exe 31 PID 2584 wrote to memory of 2576 2584 cmd.exe 33 PID 2584 wrote to memory of 2576 2584 cmd.exe 33 PID 2584 wrote to memory of 2576 2584 cmd.exe 33 PID 2584 wrote to memory of 2576 2584 cmd.exe 33 PID 2576 wrote to memory of 2548 2576 Harold.exe 34 PID 2576 wrote to memory of 2548 2576 Harold.exe 34 PID 2576 wrote to memory of 2548 2576 Harold.exe 34 PID 2576 wrote to memory of 2548 2576 Harold.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OBWH.bat3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\Harold.exeHarold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Roaming\OBWH.exe"C:\Users\Admin\AppData\Roaming\OBWH.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358KB
MD5839ed2aba2dc9810a52586c9da5e4ef4
SHA141d98bc58c253ff1fd6108814ff8f7dfc89fa0b9
SHA256c00c8dc4e32f9b2c95536f5693e646ed74e5b83519017a494d9d985d3cee6f25
SHA512baff6509e9ff2e4ba10f389b02256a6ad58adfc75fa4c6fe61c7626c3c59106f14bca246bd0135605ed40d9d90b59f32d8f07c507b2c333283421a3684de6f86
-
Filesize
84B
MD53d626ae8c552df11ee91e052aeba3ca1
SHA166dca5c00f1f65c0321b1da5adf00007911ff1a7
SHA256e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14
SHA5122530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e
-
Filesize
258B
MD59a7cb355df15c81dce0da9c4d80153c3
SHA1fa751fc895955de261043b04310a61e2956dfb59
SHA256e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43
SHA51259470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d
-
Filesize
243KB
MD5931bbe247f09588ad9bb8bee51a4e9ae
SHA1492c8fbf06b266968411a655ad38cf12f5af5970
SHA256beca6f0631cfc692f80825083b2e1428b3a76164ff26bccf5b495f99ba083877
SHA512fd677aa16ab6fb5cae42eeef698fc387e18191caaf4bb1458e746d776aa57c9e7ec78d106e0ee1d1cca8e2aa2d068cb93a11931cbb80a604e8aa67f1e8f4b2c7