Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 07:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe
-
Size
488KB
-
MD5
c1daa0ce3894b70730b6018a7a4e36c1
-
SHA1
894fc1c63b38173d52cd613db496d0f70c227147
-
SHA256
226aa3bc57e54a444bf0c8d6aeb378ac69e72b24dca95fa2dfeed1f4df5d7acd
-
SHA512
075031982e93794102ee8519f90d0f7583ec0b13f18c1acdf23f21518798d8f3a80ab23b2d7345eb48a064c4f8919934ccb53695ba71b7641a7bf0187cd56d87
-
SSDEEP
6144:1c0h522p3l04ZMSmIp3Uy28uhy0h3PHY4kJDCW9vrwEK5LNEO9dT2as5alUKS0+q:Zhxp3lZnT9bD4h3w4kR1qjtZ9tqMUpq
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0009000000016c73-18.dat family_redline behavioral1/memory/2704-29-0x0000000000E50000-0x0000000000E92000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2924 Harold.exe 2704 OBWH.exe -
Loads dropped DLL 4 IoCs
pid Process 2920 cmd.exe 2924 Harold.exe 2924 Harold.exe 2924 Harold.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Harold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OBWH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3000 2100 JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe 30 PID 2100 wrote to memory of 3000 2100 JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe 30 PID 2100 wrote to memory of 3000 2100 JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe 30 PID 2100 wrote to memory of 3000 2100 JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe 30 PID 3000 wrote to memory of 2920 3000 WScript.exe 31 PID 3000 wrote to memory of 2920 3000 WScript.exe 31 PID 3000 wrote to memory of 2920 3000 WScript.exe 31 PID 3000 wrote to memory of 2920 3000 WScript.exe 31 PID 2920 wrote to memory of 2924 2920 cmd.exe 33 PID 2920 wrote to memory of 2924 2920 cmd.exe 33 PID 2920 wrote to memory of 2924 2920 cmd.exe 33 PID 2920 wrote to memory of 2924 2920 cmd.exe 33 PID 2924 wrote to memory of 2704 2924 Harold.exe 34 PID 2924 wrote to memory of 2704 2924 Harold.exe 34 PID 2924 wrote to memory of 2704 2924 Harold.exe 34 PID 2924 wrote to memory of 2704 2924 Harold.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OBWH.bat3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Roaming\Harold.exeHarold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Roaming\OBWH.exe"C:\Users\Admin\AppData\Roaming\OBWH.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359KB
MD5e3ba75b820470eac4af9e5d5515be6d8
SHA1a10e3099387702f0c06bf62f191641bfda13d7f3
SHA256c781f293f3e6d5f1b566fd551316d47ee4298b8b836a575478b22cedce539ea7
SHA512ebb66db82e091cab65494a56d6f69284448a79c5b44a31134b6a439d7e2570d25852cb792a75ef7114c6412c8709b689c5269013ee7b69a1294e00c464f6f8fe
-
Filesize
84B
MD53d626ae8c552df11ee91e052aeba3ca1
SHA166dca5c00f1f65c0321b1da5adf00007911ff1a7
SHA256e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14
SHA5122530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e
-
Filesize
258B
MD59a7cb355df15c81dce0da9c4d80153c3
SHA1fa751fc895955de261043b04310a61e2956dfb59
SHA256e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43
SHA51259470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d
-
Filesize
250KB
MD521c41d3444484af576ee1369452933a4
SHA1eb95a25adb4e6b087150810e5ed1680aa1f563a3
SHA25644874a6a1c69eb81f4df10bdfadad251e5498e73539a8b40aa63985166734480
SHA512fac73f20efd3ad19da00c14217772b12eb0be4d83227db139675b88793c7c54157e6d1d1760a86bcf1e0ff315ee3ed5aa6f738902d72241400c44ff8c052e21e