Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2025 07:04

General

  • Target

    JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe

  • Size

    488KB

  • MD5

    c1daa0ce3894b70730b6018a7a4e36c1

  • SHA1

    894fc1c63b38173d52cd613db496d0f70c227147

  • SHA256

    226aa3bc57e54a444bf0c8d6aeb378ac69e72b24dca95fa2dfeed1f4df5d7acd

  • SHA512

    075031982e93794102ee8519f90d0f7583ec0b13f18c1acdf23f21518798d8f3a80ab23b2d7345eb48a064c4f8919934ccb53695ba71b7641a7bf0187cd56d87

  • SSDEEP

    6144:1c0h522p3l04ZMSmIp3Uy28uhy0h3PHY4kJDCW9vrwEK5LNEO9dT2as5alUKS0+q:Zhxp3lZnT9bD4h3w4kR1qjtZ9tqMUpq

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c1daa0ce3894b70730b6018a7a4e36c1.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c OBWH.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4104
        • C:\Users\Admin\AppData\Roaming\Harold.exe
          Harold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Users\Admin\AppData\Roaming\OBWH.exe
            "C:\Users\Admin\AppData\Roaming\OBWH.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Harold.exe

    Filesize

    359KB

    MD5

    e3ba75b820470eac4af9e5d5515be6d8

    SHA1

    a10e3099387702f0c06bf62f191641bfda13d7f3

    SHA256

    c781f293f3e6d5f1b566fd551316d47ee4298b8b836a575478b22cedce539ea7

    SHA512

    ebb66db82e091cab65494a56d6f69284448a79c5b44a31134b6a439d7e2570d25852cb792a75ef7114c6412c8709b689c5269013ee7b69a1294e00c464f6f8fe

  • C:\Users\Admin\AppData\Roaming\OBWH.bat

    Filesize

    84B

    MD5

    3d626ae8c552df11ee91e052aeba3ca1

    SHA1

    66dca5c00f1f65c0321b1da5adf00007911ff1a7

    SHA256

    e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14

    SHA512

    2530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e

  • C:\Users\Admin\AppData\Roaming\OBWH.exe

    Filesize

    250KB

    MD5

    21c41d3444484af576ee1369452933a4

    SHA1

    eb95a25adb4e6b087150810e5ed1680aa1f563a3

    SHA256

    44874a6a1c69eb81f4df10bdfadad251e5498e73539a8b40aa63985166734480

    SHA512

    fac73f20efd3ad19da00c14217772b12eb0be4d83227db139675b88793c7c54157e6d1d1760a86bcf1e0ff315ee3ed5aa6f738902d72241400c44ff8c052e21e

  • C:\Users\Admin\AppData\Roaming\OBWH.vbs

    Filesize

    258B

    MD5

    9a7cb355df15c81dce0da9c4d80153c3

    SHA1

    fa751fc895955de261043b04310a61e2956dfb59

    SHA256

    e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43

    SHA512

    59470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d

  • memory/4700-24-0x00000000007F0000-0x0000000000832000-memory.dmp

    Filesize

    264KB

  • memory/4700-25-0x0000000005130000-0x0000000005136000-memory.dmp

    Filesize

    24KB

  • memory/4700-26-0x0000000005830000-0x0000000005E48000-memory.dmp

    Filesize

    6.1MB

  • memory/4700-27-0x0000000005210000-0x0000000005222000-memory.dmp

    Filesize

    72KB

  • memory/4700-28-0x0000000005340000-0x000000000544A000-memory.dmp

    Filesize

    1.0MB

  • memory/4700-29-0x0000000005270000-0x00000000052AC000-memory.dmp

    Filesize

    240KB

  • memory/4700-30-0x00000000052D0000-0x000000000531C000-memory.dmp

    Filesize

    304KB