Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 18:49

General

  • Target

    3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe

  • Size

    488KB

  • MD5

    bb2129580b13f7c44599f2e5474f9929

  • SHA1

    882921976fc9c34cb849209b9c0d61e6040bf597

  • SHA256

    3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c

  • SHA512

    b3b661e826a2e906c2d77c33a50fa00f21b112762bb21356e5e001f8ff8f6267d6f3734a403d2b6f4b628d079b043db1f6caf47c015f3308c5d1fdf137321a68

  • SSDEEP

    6144:1c0h522p3l04ZMSmIp3Uy28uhy0h3PHY4kJDCW9vrwEK5LNEO9dT2as5alUKS0++:Zhxp3lZnT9bD4h3w4kR1qjtZ9tqMUp+

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe
    "C:\Users\Admin\AppData\Local\Temp\3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c OBWH.bat
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Users\Admin\AppData\Roaming\Harold.exe
          Harold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2016
          • C:\Users\Admin\AppData\Roaming\OBWH.exe
            "C:\Users\Admin\AppData\Roaming\OBWH.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Harold.exe

    Filesize

    359KB

    MD5

    e3ba75b820470eac4af9e5d5515be6d8

    SHA1

    a10e3099387702f0c06bf62f191641bfda13d7f3

    SHA256

    c781f293f3e6d5f1b566fd551316d47ee4298b8b836a575478b22cedce539ea7

    SHA512

    ebb66db82e091cab65494a56d6f69284448a79c5b44a31134b6a439d7e2570d25852cb792a75ef7114c6412c8709b689c5269013ee7b69a1294e00c464f6f8fe

  • C:\Users\Admin\AppData\Roaming\OBWH.bat

    Filesize

    84B

    MD5

    3d626ae8c552df11ee91e052aeba3ca1

    SHA1

    66dca5c00f1f65c0321b1da5adf00007911ff1a7

    SHA256

    e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14

    SHA512

    2530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e

  • C:\Users\Admin\AppData\Roaming\OBWH.exe

    Filesize

    250KB

    MD5

    21c41d3444484af576ee1369452933a4

    SHA1

    eb95a25adb4e6b087150810e5ed1680aa1f563a3

    SHA256

    44874a6a1c69eb81f4df10bdfadad251e5498e73539a8b40aa63985166734480

    SHA512

    fac73f20efd3ad19da00c14217772b12eb0be4d83227db139675b88793c7c54157e6d1d1760a86bcf1e0ff315ee3ed5aa6f738902d72241400c44ff8c052e21e

  • C:\Users\Admin\AppData\Roaming\OBWH.vbs

    Filesize

    258B

    MD5

    9a7cb355df15c81dce0da9c4d80153c3

    SHA1

    fa751fc895955de261043b04310a61e2956dfb59

    SHA256

    e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43

    SHA512

    59470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d

  • memory/2932-29-0x0000000000AB0000-0x0000000000AF2000-memory.dmp

    Filesize

    264KB

  • memory/2932-30-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB