Analysis
-
max time kernel
108s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
Resource
win10v2004-20241007-en
General
-
Target
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
-
Size
487KB
-
MD5
6f9d993a627db18c1811606dafaa1d0f
-
SHA1
c3868d3cfd0303cd98b3389f4f99e7a7e4637745
-
SHA256
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc
-
SHA512
ac1d5290f1690b40f640e71afd0c7f00efddcc11bbb2b46c68dc4ca6dd2fb6e6877e45610a6abcc55f7d8000b0fef4acbc6f9bb7611de96ffcfd1de5f8071cf5
-
SSDEEP
12288:Ihxp3lZnT9bD4h3d1yBGIxUyxy4H9KIUfNTu:IJlh9bD4hryBG+GNa
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x000c000000023b6e-19.dat family_redline behavioral2/memory/1396-24-0x0000000000A70000-0x0000000000AB0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Harold.exe -
Executes dropped EXE 2 IoCs
pid Process 2860 Harold.exe 1396 OBWH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Harold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OBWH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3916 wrote to memory of 4076 3916 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe 83 PID 3916 wrote to memory of 4076 3916 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe 83 PID 3916 wrote to memory of 4076 3916 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe 83 PID 4076 wrote to memory of 528 4076 WScript.exe 84 PID 4076 wrote to memory of 528 4076 WScript.exe 84 PID 4076 wrote to memory of 528 4076 WScript.exe 84 PID 528 wrote to memory of 2860 528 cmd.exe 86 PID 528 wrote to memory of 2860 528 cmd.exe 86 PID 528 wrote to memory of 2860 528 cmd.exe 86 PID 2860 wrote to memory of 1396 2860 Harold.exe 87 PID 2860 wrote to memory of 1396 2860 Harold.exe 87 PID 2860 wrote to memory of 1396 2860 Harold.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe"C:\Users\Admin\AppData\Local\Temp\0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OBWH.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Roaming\Harold.exeHarold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\OBWH.exe"C:\Users\Admin\AppData\Roaming\OBWH.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1396
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358KB
MD5839ed2aba2dc9810a52586c9da5e4ef4
SHA141d98bc58c253ff1fd6108814ff8f7dfc89fa0b9
SHA256c00c8dc4e32f9b2c95536f5693e646ed74e5b83519017a494d9d985d3cee6f25
SHA512baff6509e9ff2e4ba10f389b02256a6ad58adfc75fa4c6fe61c7626c3c59106f14bca246bd0135605ed40d9d90b59f32d8f07c507b2c333283421a3684de6f86
-
Filesize
84B
MD53d626ae8c552df11ee91e052aeba3ca1
SHA166dca5c00f1f65c0321b1da5adf00007911ff1a7
SHA256e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14
SHA5122530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e
-
Filesize
243KB
MD5931bbe247f09588ad9bb8bee51a4e9ae
SHA1492c8fbf06b266968411a655ad38cf12f5af5970
SHA256beca6f0631cfc692f80825083b2e1428b3a76164ff26bccf5b495f99ba083877
SHA512fd677aa16ab6fb5cae42eeef698fc387e18191caaf4bb1458e746d776aa57c9e7ec78d106e0ee1d1cca8e2aa2d068cb93a11931cbb80a604e8aa67f1e8f4b2c7
-
Filesize
258B
MD59a7cb355df15c81dce0da9c4d80153c3
SHA1fa751fc895955de261043b04310a61e2956dfb59
SHA256e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43
SHA51259470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d