Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 09:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe
-
Size
487KB
-
MD5
1ce49705d8970f5eb961f86feb30529c
-
SHA1
f83e0f9a4f9548305460349cd32ece0897ec2dcb
-
SHA256
43e6afa2b5afd7c1f447a4c3ea13ae0de23bfe09b63c753251b653692cbd4b10
-
SHA512
56914406f52ec41270036389763f1bdb7025a330a0f1c91bbebc114992a51437d7cbc512e53227c0f1c81606a70a3c263eec9bc345df9a04da8052c3e93a0f4e
-
SSDEEP
12288:Ihxp3lZnT9bD4h3d1yBGIxUyxy4H9KIUfNTq:IJlh9bD4hryBG+GNu
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x000c000000023b72-19.dat family_redline behavioral2/memory/3424-24-0x0000000000460000-0x00000000004A0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Harold.exe -
Executes dropped EXE 2 IoCs
pid Process 3048 Harold.exe 3424 OBWH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OBWH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Harold.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1528 wrote to memory of 904 1528 JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe 82 PID 1528 wrote to memory of 904 1528 JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe 82 PID 1528 wrote to memory of 904 1528 JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe 82 PID 904 wrote to memory of 3392 904 WScript.exe 83 PID 904 wrote to memory of 3392 904 WScript.exe 83 PID 904 wrote to memory of 3392 904 WScript.exe 83 PID 3392 wrote to memory of 3048 3392 cmd.exe 85 PID 3392 wrote to memory of 3048 3392 cmd.exe 85 PID 3392 wrote to memory of 3048 3392 cmd.exe 85 PID 3048 wrote to memory of 3424 3048 Harold.exe 86 PID 3048 wrote to memory of 3424 3048 Harold.exe 86 PID 3048 wrote to memory of 3424 3048 Harold.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1ce49705d8970f5eb961f86feb30529c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OBWH.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Roaming\Harold.exeHarold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\OBWH.exe"C:\Users\Admin\AppData\Roaming\OBWH.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3424
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358KB
MD5839ed2aba2dc9810a52586c9da5e4ef4
SHA141d98bc58c253ff1fd6108814ff8f7dfc89fa0b9
SHA256c00c8dc4e32f9b2c95536f5693e646ed74e5b83519017a494d9d985d3cee6f25
SHA512baff6509e9ff2e4ba10f389b02256a6ad58adfc75fa4c6fe61c7626c3c59106f14bca246bd0135605ed40d9d90b59f32d8f07c507b2c333283421a3684de6f86
-
Filesize
84B
MD53d626ae8c552df11ee91e052aeba3ca1
SHA166dca5c00f1f65c0321b1da5adf00007911ff1a7
SHA256e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14
SHA5122530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e
-
Filesize
243KB
MD5931bbe247f09588ad9bb8bee51a4e9ae
SHA1492c8fbf06b266968411a655ad38cf12f5af5970
SHA256beca6f0631cfc692f80825083b2e1428b3a76164ff26bccf5b495f99ba083877
SHA512fd677aa16ab6fb5cae42eeef698fc387e18191caaf4bb1458e746d776aa57c9e7ec78d106e0ee1d1cca8e2aa2d068cb93a11931cbb80a604e8aa67f1e8f4b2c7
-
Filesize
258B
MD59a7cb355df15c81dce0da9c4d80153c3
SHA1fa751fc895955de261043b04310a61e2956dfb59
SHA256e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43
SHA51259470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d