Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 18:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe
-
Size
396KB
-
MD5
eacbae9bdaa559182cf794986c6a10c1
-
SHA1
6943b0ec8e128dd473010269b50b494b2cea1401
-
SHA256
6c35facea27417051d4ffccbffd9a353ce00b548b50944d3ef4a246298c037f1
-
SHA512
205b8b8c25ee6cab96a435bc4b9d4eb785c6824cf45ad6bb8d5d851f9dbd43afd313ed029c762a30559d4cdabba49a797ce48778e0fb312e91a479a238459bed
-
SSDEEP
6144:olHxrJ4N/xM5UKJmIf3OTCU+cENbB30A4PzE:IpJUskIm2PBz
Malware Config
Extracted
redline
wincode
4life.longmusic.com:6640
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3088-7-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3088-7-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation fdert.exe -
Executes dropped EXE 1 IoCs
pid Process 3552 fdert.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2044 set thread context of 3088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 83 PID 3552 set thread context of 2144 3552 fdert.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdert.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3772 schtasks.exe 3984 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe Token: SeDebugPrivilege 3088 RegAsm.exe Token: SeDebugPrivilege 3552 fdert.exe Token: SeDebugPrivilege 2144 RegAsm.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2044 wrote to memory of 3088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 83 PID 2044 wrote to memory of 3088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 83 PID 2044 wrote to memory of 3088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 83 PID 2044 wrote to memory of 3088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 83 PID 2044 wrote to memory of 3088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 83 PID 2044 wrote to memory of 3088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 83 PID 2044 wrote to memory of 3088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 83 PID 2044 wrote to memory of 3088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 83 PID 2044 wrote to memory of 384 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 85 PID 2044 wrote to memory of 384 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 85 PID 2044 wrote to memory of 384 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 85 PID 2044 wrote to memory of 5088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 87 PID 2044 wrote to memory of 5088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 87 PID 2044 wrote to memory of 5088 2044 JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe 87 PID 384 wrote to memory of 3772 384 cmd.exe 89 PID 384 wrote to memory of 3772 384 cmd.exe 89 PID 384 wrote to memory of 3772 384 cmd.exe 89 PID 3552 wrote to memory of 2144 3552 fdert.exe 108 PID 3552 wrote to memory of 2144 3552 fdert.exe 108 PID 3552 wrote to memory of 2144 3552 fdert.exe 108 PID 3552 wrote to memory of 2144 3552 fdert.exe 108 PID 3552 wrote to memory of 2144 3552 fdert.exe 108 PID 3552 wrote to memory of 2144 3552 fdert.exe 108 PID 3552 wrote to memory of 2144 3552 fdert.exe 108 PID 3552 wrote to memory of 2144 3552 fdert.exe 108 PID 3552 wrote to memory of 4596 3552 fdert.exe 110 PID 3552 wrote to memory of 4596 3552 fdert.exe 110 PID 3552 wrote to memory of 4596 3552 fdert.exe 110 PID 3552 wrote to memory of 676 3552 fdert.exe 111 PID 3552 wrote to memory of 676 3552 fdert.exe 111 PID 3552 wrote to memory of 676 3552 fdert.exe 111 PID 4596 wrote to memory of 3984 4596 cmd.exe 114 PID 4596 wrote to memory of 3984 4596 cmd.exe 114 PID 4596 wrote to memory of 3984 4596 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\fdert\fdert.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\fdert\fdert.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1.exe" "C:\Users\Admin\AppData\Roaming\fdert\fdert.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Users\Admin\AppData\Roaming\fdert\fdert.exeC:\Users\Admin\AppData\Roaming\fdert\fdert.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\fdert\fdert.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\fdert\fdert.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3984
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\fdert\fdert.exe" "C:\Users\Admin\AppData\Roaming\fdert\fdert.exe"2⤵
- System Location Discovery: System Language Discovery
PID:676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5eacbae9bdaa559182cf794986c6a10c1
SHA16943b0ec8e128dd473010269b50b494b2cea1401
SHA2566c35facea27417051d4ffccbffd9a353ce00b548b50944d3ef4a246298c037f1
SHA512205b8b8c25ee6cab96a435bc4b9d4eb785c6824cf45ad6bb8d5d851f9dbd43afd313ed029c762a30559d4cdabba49a797ce48778e0fb312e91a479a238459bed