Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
Resource
win10v2004-20241007-en
General
-
Target
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
-
Size
487KB
-
MD5
6f9d993a627db18c1811606dafaa1d0f
-
SHA1
c3868d3cfd0303cd98b3389f4f99e7a7e4637745
-
SHA256
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc
-
SHA512
ac1d5290f1690b40f640e71afd0c7f00efddcc11bbb2b46c68dc4ca6dd2fb6e6877e45610a6abcc55f7d8000b0fef4acbc6f9bb7611de96ffcfd1de5f8071cf5
-
SSDEEP
12288:Ihxp3lZnT9bD4h3d1yBGIxUyxy4H9KIUfNTu:IJlh9bD4hryBG+GNa
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016cc8-18.dat family_redline behavioral1/memory/2828-29-0x0000000000A90000-0x0000000000AD0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2720 Harold.exe 2828 OBWH.exe -
Loads dropped DLL 4 IoCs
pid Process 2480 cmd.exe 2720 Harold.exe 2720 Harold.exe 2720 Harold.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Harold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OBWH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2116 2688 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe 30 PID 2688 wrote to memory of 2116 2688 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe 30 PID 2688 wrote to memory of 2116 2688 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe 30 PID 2688 wrote to memory of 2116 2688 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe 30 PID 2116 wrote to memory of 2480 2116 WScript.exe 31 PID 2116 wrote to memory of 2480 2116 WScript.exe 31 PID 2116 wrote to memory of 2480 2116 WScript.exe 31 PID 2116 wrote to memory of 2480 2116 WScript.exe 31 PID 2480 wrote to memory of 2720 2480 cmd.exe 33 PID 2480 wrote to memory of 2720 2480 cmd.exe 33 PID 2480 wrote to memory of 2720 2480 cmd.exe 33 PID 2480 wrote to memory of 2720 2480 cmd.exe 33 PID 2720 wrote to memory of 2828 2720 Harold.exe 34 PID 2720 wrote to memory of 2828 2720 Harold.exe 34 PID 2720 wrote to memory of 2828 2720 Harold.exe 34 PID 2720 wrote to memory of 2828 2720 Harold.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe"C:\Users\Admin\AppData\Local\Temp\0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OBWH.bat3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Roaming\Harold.exeHarold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Roaming\OBWH.exe"C:\Users\Admin\AppData\Roaming\OBWH.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358KB
MD5839ed2aba2dc9810a52586c9da5e4ef4
SHA141d98bc58c253ff1fd6108814ff8f7dfc89fa0b9
SHA256c00c8dc4e32f9b2c95536f5693e646ed74e5b83519017a494d9d985d3cee6f25
SHA512baff6509e9ff2e4ba10f389b02256a6ad58adfc75fa4c6fe61c7626c3c59106f14bca246bd0135605ed40d9d90b59f32d8f07c507b2c333283421a3684de6f86
-
Filesize
84B
MD53d626ae8c552df11ee91e052aeba3ca1
SHA166dca5c00f1f65c0321b1da5adf00007911ff1a7
SHA256e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14
SHA5122530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e
-
Filesize
258B
MD59a7cb355df15c81dce0da9c4d80153c3
SHA1fa751fc895955de261043b04310a61e2956dfb59
SHA256e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43
SHA51259470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d
-
Filesize
243KB
MD5931bbe247f09588ad9bb8bee51a4e9ae
SHA1492c8fbf06b266968411a655ad38cf12f5af5970
SHA256beca6f0631cfc692f80825083b2e1428b3a76164ff26bccf5b495f99ba083877
SHA512fd677aa16ab6fb5cae42eeef698fc387e18191caaf4bb1458e746d776aa57c9e7ec78d106e0ee1d1cca8e2aa2d068cb93a11931cbb80a604e8aa67f1e8f4b2c7