Analysis
-
max time kernel
165s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe
Resource
win10v2004-20231023-en
General
-
Target
3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe
-
Size
1.1MB
-
MD5
d73b0976047b8aabf464bb07fab87883
-
SHA1
0415112a1b111b28558cf0439d87559f0ff18420
-
SHA256
3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857
-
SHA512
bec2ccde03c032ee336e110ea8ce2dde98fffd253c668aff9d79cda31ded820ec07c7b7cb090d748b04cc194acbbca273d27c8320ae9776c69bca79f32198210
-
SSDEEP
24576:GyHX79kfcAvSvWrW0Es5tsk+igugN9mDYSq5:VHX79edvlTEgt+iuNV
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/4936-7-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 2084 11uY8466.exe 4168 12gg508.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2084 set thread context of 4936 2084 11uY8466.exe 96 PID 4168 set thread context of 4068 4168 12gg508.exe 100 -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2084 4948 3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe 94 PID 4948 wrote to memory of 2084 4948 3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe 94 PID 4948 wrote to memory of 2084 4948 3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe 94 PID 2084 wrote to memory of 4936 2084 11uY8466.exe 96 PID 2084 wrote to memory of 4936 2084 11uY8466.exe 96 PID 2084 wrote to memory of 4936 2084 11uY8466.exe 96 PID 2084 wrote to memory of 4936 2084 11uY8466.exe 96 PID 2084 wrote to memory of 4936 2084 11uY8466.exe 96 PID 2084 wrote to memory of 4936 2084 11uY8466.exe 96 PID 2084 wrote to memory of 4936 2084 11uY8466.exe 96 PID 2084 wrote to memory of 4936 2084 11uY8466.exe 96 PID 4948 wrote to memory of 4168 4948 3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe 97 PID 4948 wrote to memory of 4168 4948 3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe 97 PID 4948 wrote to memory of 4168 4948 3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe 97 PID 4168 wrote to memory of 2476 4168 12gg508.exe 99 PID 4168 wrote to memory of 2476 4168 12gg508.exe 99 PID 4168 wrote to memory of 2476 4168 12gg508.exe 99 PID 4168 wrote to memory of 4068 4168 12gg508.exe 100 PID 4168 wrote to memory of 4068 4168 12gg508.exe 100 PID 4168 wrote to memory of 4068 4168 12gg508.exe 100 PID 4168 wrote to memory of 4068 4168 12gg508.exe 100 PID 4168 wrote to memory of 4068 4168 12gg508.exe 100 PID 4168 wrote to memory of 4068 4168 12gg508.exe 100 PID 4168 wrote to memory of 4068 4168 12gg508.exe 100 PID 4168 wrote to memory of 4068 4168 12gg508.exe 100 PID 4168 wrote to memory of 4068 4168 12gg508.exe 100 PID 4168 wrote to memory of 4068 4168 12gg508.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe"C:\Users\Admin\AppData\Local\Temp\3f2b220fb1edaa1c249f594aec2922e561b1a7f8d65be8ef71e2aa64552bc857.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11uY8466.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11uY8466.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12gg508.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12gg508.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56675d984950e33f6e64fb4932366d9bd
SHA1ee252d3af80af318be041b4a99b43586a1ddd788
SHA256ec04c9fee6f611a2a6d3c888b9d7c8a44746c41f1b58d1ee8391a349e39d8f97
SHA512c9c6de496fa0beee6da6cf71a355d2c6ea81bb8038127880d34874659769208c41390020c66207ad169397be343cbfde638933f4936dc19959306bfc7308e931
-
Filesize
1.1MB
MD56675d984950e33f6e64fb4932366d9bd
SHA1ee252d3af80af318be041b4a99b43586a1ddd788
SHA256ec04c9fee6f611a2a6d3c888b9d7c8a44746c41f1b58d1ee8391a349e39d8f97
SHA512c9c6de496fa0beee6da6cf71a355d2c6ea81bb8038127880d34874659769208c41390020c66207ad169397be343cbfde638933f4936dc19959306bfc7308e931
-
Filesize
2.4MB
MD5d6db137b54baf89a727b5faa08a1a719
SHA1eb0224b5cb35913296ae2f9e2d67d60ec7f37bad
SHA2564fc05785675082f3669f174086d5e502583a80c876fed14dc3cd516a6f5ee515
SHA512eb0f551c5736720f44962379993672112651349ce15b8a82fedd3c5b7416a65d2f7697f90e9b042bc0966b8db649c634facf6068d0249e3ff17b89b5a4cf1b68
-
Filesize
2.4MB
MD5d6db137b54baf89a727b5faa08a1a719
SHA1eb0224b5cb35913296ae2f9e2d67d60ec7f37bad
SHA2564fc05785675082f3669f174086d5e502583a80c876fed14dc3cd516a6f5ee515
SHA512eb0f551c5736720f44962379993672112651349ce15b8a82fedd3c5b7416a65d2f7697f90e9b042bc0966b8db649c634facf6068d0249e3ff17b89b5a4cf1b68