Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 18:49
Static task
static1
Behavioral task
behavioral1
Sample
3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe
Resource
win10v2004-20241007-en
General
-
Target
3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe
-
Size
488KB
-
MD5
bb2129580b13f7c44599f2e5474f9929
-
SHA1
882921976fc9c34cb849209b9c0d61e6040bf597
-
SHA256
3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c
-
SHA512
b3b661e826a2e906c2d77c33a50fa00f21b112762bb21356e5e001f8ff8f6267d6f3734a403d2b6f4b628d079b043db1f6caf47c015f3308c5d1fdf137321a68
-
SSDEEP
6144:1c0h522p3l04ZMSmIp3Uy28uhy0h3PHY4kJDCW9vrwEK5LNEO9dT2as5alUKS0++:Zhxp3lZnT9bD4h3w4kR1qjtZ9tqMUp+
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023c9e-19.dat family_redline behavioral2/memory/3644-24-0x0000000000980000-0x00000000009C2000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Harold.exe -
Executes dropped EXE 2 IoCs
pid Process 1208 Harold.exe 3644 OBWH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OBWH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Harold.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4636 4412 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe 83 PID 4412 wrote to memory of 4636 4412 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe 83 PID 4412 wrote to memory of 4636 4412 3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe 83 PID 4636 wrote to memory of 1976 4636 WScript.exe 84 PID 4636 wrote to memory of 1976 4636 WScript.exe 84 PID 4636 wrote to memory of 1976 4636 WScript.exe 84 PID 1976 wrote to memory of 1208 1976 cmd.exe 86 PID 1976 wrote to memory of 1208 1976 cmd.exe 86 PID 1976 wrote to memory of 1208 1976 cmd.exe 86 PID 1208 wrote to memory of 3644 1208 Harold.exe 87 PID 1208 wrote to memory of 3644 1208 Harold.exe 87 PID 1208 wrote to memory of 3644 1208 Harold.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe"C:\Users\Admin\AppData\Local\Temp\3437bc8280e2e5f2dcb0d9e1e74ec2c373a52c6a88939d0b8f4d0baa1ebc434c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OBWH.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\Harold.exeHarold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Roaming\OBWH.exe"C:\Users\Admin\AppData\Roaming\OBWH.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3644
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359KB
MD5e3ba75b820470eac4af9e5d5515be6d8
SHA1a10e3099387702f0c06bf62f191641bfda13d7f3
SHA256c781f293f3e6d5f1b566fd551316d47ee4298b8b836a575478b22cedce539ea7
SHA512ebb66db82e091cab65494a56d6f69284448a79c5b44a31134b6a439d7e2570d25852cb792a75ef7114c6412c8709b689c5269013ee7b69a1294e00c464f6f8fe
-
Filesize
84B
MD53d626ae8c552df11ee91e052aeba3ca1
SHA166dca5c00f1f65c0321b1da5adf00007911ff1a7
SHA256e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14
SHA5122530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e
-
Filesize
250KB
MD521c41d3444484af576ee1369452933a4
SHA1eb95a25adb4e6b087150810e5ed1680aa1f563a3
SHA25644874a6a1c69eb81f4df10bdfadad251e5498e73539a8b40aa63985166734480
SHA512fac73f20efd3ad19da00c14217772b12eb0be4d83227db139675b88793c7c54157e6d1d1760a86bcf1e0ff315ee3ed5aa6f738902d72241400c44ff8c052e21e
-
Filesize
258B
MD59a7cb355df15c81dce0da9c4d80153c3
SHA1fa751fc895955de261043b04310a61e2956dfb59
SHA256e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43
SHA51259470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d