Analysis

  • max time kernel
    108s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 02:42

General

  • Target

    0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe

  • Size

    487KB

  • MD5

    6f9d993a627db18c1811606dafaa1d0f

  • SHA1

    c3868d3cfd0303cd98b3389f4f99e7a7e4637745

  • SHA256

    0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc

  • SHA512

    ac1d5290f1690b40f640e71afd0c7f00efddcc11bbb2b46c68dc4ca6dd2fb6e6877e45610a6abcc55f7d8000b0fef4acbc6f9bb7611de96ffcfd1de5f8071cf5

  • SSDEEP

    12288:Ihxp3lZnT9bD4h3d1yBGIxUyxy4H9KIUfNTu:IJlh9bD4hryBG+GNa

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
    "C:\Users\Admin\AppData\Local\Temp\0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3916
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c OBWH.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:528
        • C:\Users\Admin\AppData\Roaming\Harold.exe
          Harold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2860
          • C:\Users\Admin\AppData\Roaming\OBWH.exe
            "C:\Users\Admin\AppData\Roaming\OBWH.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Harold.exe

    Filesize

    358KB

    MD5

    839ed2aba2dc9810a52586c9da5e4ef4

    SHA1

    41d98bc58c253ff1fd6108814ff8f7dfc89fa0b9

    SHA256

    c00c8dc4e32f9b2c95536f5693e646ed74e5b83519017a494d9d985d3cee6f25

    SHA512

    baff6509e9ff2e4ba10f389b02256a6ad58adfc75fa4c6fe61c7626c3c59106f14bca246bd0135605ed40d9d90b59f32d8f07c507b2c333283421a3684de6f86

  • C:\Users\Admin\AppData\Roaming\OBWH.bat

    Filesize

    84B

    MD5

    3d626ae8c552df11ee91e052aeba3ca1

    SHA1

    66dca5c00f1f65c0321b1da5adf00007911ff1a7

    SHA256

    e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14

    SHA512

    2530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e

  • C:\Users\Admin\AppData\Roaming\OBWH.exe

    Filesize

    243KB

    MD5

    931bbe247f09588ad9bb8bee51a4e9ae

    SHA1

    492c8fbf06b266968411a655ad38cf12f5af5970

    SHA256

    beca6f0631cfc692f80825083b2e1428b3a76164ff26bccf5b495f99ba083877

    SHA512

    fd677aa16ab6fb5cae42eeef698fc387e18191caaf4bb1458e746d776aa57c9e7ec78d106e0ee1d1cca8e2aa2d068cb93a11931cbb80a604e8aa67f1e8f4b2c7

  • C:\Users\Admin\AppData\Roaming\OBWH.vbs

    Filesize

    258B

    MD5

    9a7cb355df15c81dce0da9c4d80153c3

    SHA1

    fa751fc895955de261043b04310a61e2956dfb59

    SHA256

    e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43

    SHA512

    59470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d

  • memory/1396-24-0x0000000000A70000-0x0000000000AB0000-memory.dmp

    Filesize

    256KB

  • memory/1396-25-0x0000000002E70000-0x0000000002E76000-memory.dmp

    Filesize

    24KB

  • memory/1396-26-0x0000000005B70000-0x0000000006188000-memory.dmp

    Filesize

    6.1MB

  • memory/1396-27-0x0000000005470000-0x0000000005482000-memory.dmp

    Filesize

    72KB

  • memory/1396-28-0x0000000005660000-0x000000000576A000-memory.dmp

    Filesize

    1.0MB

  • memory/1396-29-0x00000000054D0000-0x000000000550C000-memory.dmp

    Filesize

    240KB

  • memory/1396-30-0x0000000005550000-0x000000000559C000-memory.dmp

    Filesize

    304KB