Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 18:49
Static task
static1
Behavioral task
behavioral1
Sample
3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe
Resource
win10v2004-20241007-en
General
-
Target
3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe
-
Size
488KB
-
MD5
bb2129580b13f7c44599f2e5474f9929
-
SHA1
882921976fc9c34cb849209b9c0d61e6040bf597
-
SHA256
3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c
-
SHA512
b3b661e826a2e906c2d77c33a50fa00f21b112762bb21356e5e001f8ff8f6267d6f3734a403d2b6f4b628d079b043db1f6caf47c015f3308c5d1fdf137321a68
-
SSDEEP
6144:1c0h522p3l04ZMSmIp3Uy28uhy0h3PHY4kJDCW9vrwEK5LNEO9dT2as5alUKS0++:Zhxp3lZnT9bD4h3w4kR1qjtZ9tqMUp+
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0030000000018bd7-27.dat family_redline behavioral1/memory/2932-29-0x0000000000AB0000-0x0000000000AF2000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2016 Harold.exe 2932 OBWH.exe -
Loads dropped DLL 4 IoCs
pid Process 2596 cmd.exe 2016 Harold.exe 2016 Harold.exe 2016 Harold.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Harold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OBWH.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2004 wrote to memory of 3032 2004 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe 30 PID 2004 wrote to memory of 3032 2004 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe 30 PID 2004 wrote to memory of 3032 2004 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe 30 PID 2004 wrote to memory of 3032 2004 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe 30 PID 3032 wrote to memory of 2596 3032 WScript.exe 31 PID 3032 wrote to memory of 2596 3032 WScript.exe 31 PID 3032 wrote to memory of 2596 3032 WScript.exe 31 PID 3032 wrote to memory of 2596 3032 WScript.exe 31 PID 2596 wrote to memory of 2016 2596 cmd.exe 33 PID 2596 wrote to memory of 2016 2596 cmd.exe 33 PID 2596 wrote to memory of 2016 2596 cmd.exe 33 PID 2596 wrote to memory of 2016 2596 cmd.exe 33 PID 2016 wrote to memory of 2932 2016 Harold.exe 34 PID 2016 wrote to memory of 2932 2016 Harold.exe 34 PID 2016 wrote to memory of 2932 2016 Harold.exe 34 PID 2016 wrote to memory of 2932 2016 Harold.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe"C:\Users\Admin\AppData\Local\Temp\3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OBWH.bat3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Roaming\Harold.exeHarold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\OBWH.exe"C:\Users\Admin\AppData\Roaming\OBWH.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359KB
MD5e3ba75b820470eac4af9e5d5515be6d8
SHA1a10e3099387702f0c06bf62f191641bfda13d7f3
SHA256c781f293f3e6d5f1b566fd551316d47ee4298b8b836a575478b22cedce539ea7
SHA512ebb66db82e091cab65494a56d6f69284448a79c5b44a31134b6a439d7e2570d25852cb792a75ef7114c6412c8709b689c5269013ee7b69a1294e00c464f6f8fe
-
Filesize
84B
MD53d626ae8c552df11ee91e052aeba3ca1
SHA166dca5c00f1f65c0321b1da5adf00007911ff1a7
SHA256e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14
SHA5122530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e
-
Filesize
250KB
MD521c41d3444484af576ee1369452933a4
SHA1eb95a25adb4e6b087150810e5ed1680aa1f563a3
SHA25644874a6a1c69eb81f4df10bdfadad251e5498e73539a8b40aa63985166734480
SHA512fac73f20efd3ad19da00c14217772b12eb0be4d83227db139675b88793c7c54157e6d1d1760a86bcf1e0ff315ee3ed5aa6f738902d72241400c44ff8c052e21e
-
Filesize
258B
MD59a7cb355df15c81dce0da9c4d80153c3
SHA1fa751fc895955de261043b04310a61e2956dfb59
SHA256e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43
SHA51259470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d