Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 02:49

General

  • Target

    0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe

  • Size

    487KB

  • MD5

    6f9d993a627db18c1811606dafaa1d0f

  • SHA1

    c3868d3cfd0303cd98b3389f4f99e7a7e4637745

  • SHA256

    0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc

  • SHA512

    ac1d5290f1690b40f640e71afd0c7f00efddcc11bbb2b46c68dc4ca6dd2fb6e6877e45610a6abcc55f7d8000b0fef4acbc6f9bb7611de96ffcfd1de5f8071cf5

  • SSDEEP

    12288:Ihxp3lZnT9bD4h3d1yBGIxUyxy4H9KIUfNTu:IJlh9bD4hryBG+GNa

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe
    "C:\Users\Admin\AppData\Local\Temp\0ff0729cd09df6cad3137f67a369ffcc4dccba28298399b527ec8b26438297fc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OBWH.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c OBWH.bat
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1576
        • C:\Users\Admin\AppData\Roaming\Harold.exe
          Harold.exe -p"5POJ!@0JK=jf65POJ!@0JK=jf6"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Users\Admin\AppData\Roaming\OBWH.exe
            "C:\Users\Admin\AppData\Roaming\OBWH.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\OBWH.bat

    Filesize

    84B

    MD5

    3d626ae8c552df11ee91e052aeba3ca1

    SHA1

    66dca5c00f1f65c0321b1da5adf00007911ff1a7

    SHA256

    e40e1306e04aa54ba30eec6d89d7bbb035b5c27e577fcd07ae6a19edf38f2c14

    SHA512

    2530d71aa120ff1971c61cc9fdcf089ece945ff4b84adb44168b9582be69fd3dbb4aacb1f42e4b7c8cd99e61f82e9858db6ffede902892f132e76d6d8b995b7e

  • C:\Users\Admin\AppData\Roaming\OBWH.vbs

    Filesize

    258B

    MD5

    9a7cb355df15c81dce0da9c4d80153c3

    SHA1

    fa751fc895955de261043b04310a61e2956dfb59

    SHA256

    e3d957c613e6fa315c6436ac59ca471841aff54a999e8baf7004e36506edaa43

    SHA512

    59470eda05cf5712aea9095f1ec520e6ce36dced9c7c37d0c02a5aa35d4f1cde87f333722384936c700dbda6ef1e3a86975c9164ef9e1a9f8357acd2c899cc0d

  • \Users\Admin\AppData\Roaming\Harold.exe

    Filesize

    358KB

    MD5

    839ed2aba2dc9810a52586c9da5e4ef4

    SHA1

    41d98bc58c253ff1fd6108814ff8f7dfc89fa0b9

    SHA256

    c00c8dc4e32f9b2c95536f5693e646ed74e5b83519017a494d9d985d3cee6f25

    SHA512

    baff6509e9ff2e4ba10f389b02256a6ad58adfc75fa4c6fe61c7626c3c59106f14bca246bd0135605ed40d9d90b59f32d8f07c507b2c333283421a3684de6f86

  • \Users\Admin\AppData\Roaming\OBWH.exe

    Filesize

    243KB

    MD5

    931bbe247f09588ad9bb8bee51a4e9ae

    SHA1

    492c8fbf06b266968411a655ad38cf12f5af5970

    SHA256

    beca6f0631cfc692f80825083b2e1428b3a76164ff26bccf5b495f99ba083877

    SHA512

    fd677aa16ab6fb5cae42eeef698fc387e18191caaf4bb1458e746d776aa57c9e7ec78d106e0ee1d1cca8e2aa2d068cb93a11931cbb80a604e8aa67f1e8f4b2c7

  • memory/2788-29-0x0000000000F20000-0x0000000000F60000-memory.dmp

    Filesize

    256KB

  • memory/2788-30-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB