Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
Resource
win10v2004-20241007-en
General
-
Target
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
-
Size
487KB
-
MD5
6f9d993a627db18c1811606dafaa1d0f
-
SHA1
c3868d3cfd0303cd98b3389f4f99e7a7e4637745
-
SHA256
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc
-
SHA512
ac1d5290f1690b40f640e71afd0c7f00efddcc11bbb2b46c68dc4ca6dd2fb6e6877e45610a6abcc55f7d8000b0fef4acbc6f9bb7611de96ffcfd1de5f8071cf5
-
SSDEEP
12288:Ihxp3lZnT9bD4h3d1yBGIxUyxy4H9KIUfNTu:IJlh9bD4hryBG+GNa
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\OBWH.exe family_redline behavioral1/memory/2788-29-0x0000000000F20000-0x0000000000F60000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
Processes:
Harold.exeOBWH.exepid process 2156 Harold.exe 2788 OBWH.exe -
Loads dropped DLL 4 IoCs
Processes:
cmd.exeHarold.exepid process 1576 cmd.exe 2156 Harold.exe 2156 Harold.exe 2156 Harold.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exeWScript.execmd.exeHarold.exeOBWH.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Harold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OBWH.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exeWScript.execmd.exeHarold.exedescription pid process target process PID 2920 wrote to memory of 2352 2920 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe WScript.exe PID 2920 wrote to memory of 2352 2920 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe WScript.exe PID 2920 wrote to memory of 2352 2920 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe WScript.exe PID 2920 wrote to memory of 2352 2920 0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe WScript.exe PID 2352 wrote to memory of 1576 2352 WScript.exe cmd.exe PID 2352 wrote to memory of 1576 2352 WScript.exe cmd.exe PID 2352 wrote to memory of 1576 2352 WScript.exe cmd.exe PID 2352 wrote to memory of 1576 2352 WScript.exe cmd.exe PID 1576 wrote to memory of 2156 1576 cmd.exe Harold.exe PID 1576 wrote to memory of 2156 1576 cmd.exe Harold.exe PID 1576 wrote to memory of 2156 1576 cmd.exe Harold.exe PID 1576 wrote to memory of 2156 1576 cmd.exe Harold.exe PID 2156 wrote to memory of 2788 2156 Harold.exe OBWH.exe PID 2156 wrote to memory of 2788 2156 Harold.exe OBWH.exe PID 2156 wrote to memory of 2788 2156 Harold.exe OBWH.exe PID 2156 wrote to memory of 2788 2156 Harold.exe OBWH.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe"C:\Users\Admin\AppData\Local\Temp\0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OBWH.bat3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\Harold.exeHarold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Roaming\OBWH.exe"C:\Users\Admin\AppData\Roaming\OBWH.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD53d626ae8c552df11ee91e052aeba3ca1
SHA166dca5c00f1f65c0321b1da5adf00007911ff1a7
SHA256e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14
SHA5122530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e
-
Filesize
258B
MD59a7cb355df15c81dce0da9c4d80153c3
SHA1fa751fc895955de261043b04310a61e2956dfb59
SHA256e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43
SHA51259470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d
-
Filesize
358KB
MD5839ed2aba2dc9810a52586c9da5e4ef4
SHA141d98bc58c253ff1fd6108814ff8f7dfc89fa0b9
SHA256c00c8dc4e32f9b2c95536f5693e646ed74e5b83519017a494d9d985d3cee6f25
SHA512baff6509e9ff2e4ba10f389b02256a6ad58adfc75fa4c6fe61c7626c3c59106f14bca246bd0135605ed40d9d90b59f32d8f07c507b2c333283421a3684de6f86
-
Filesize
243KB
MD5931bbe247f09588ad9bb8bee51a4e9ae
SHA1492c8fbf06b266968411a655ad38cf12f5af5970
SHA256beca6f0631cfc692f80825083b2e1428b3a76164ff26bccf5b495f99ba083877
SHA512fd677aa16ab6fb5cae42eeef698fc387e18191caaf4bb1458e746d776aa57c9e7ec78d106e0ee1d1cca8e2aa2d068cb93a11931cbb80a604e8aa67f1e8f4b2c7