Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/11/2023, 00:30

General

  • Target

    14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe

  • Size

    1.1MB

  • MD5

    b0be87fbefa8fb816eda48b5873f30e6

  • SHA1

    580f46fb499394653f1c7a29a1bc0baccad32c0a

  • SHA256

    14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19

  • SHA512

    b7292045ce5adf9297dc9a4e68f9f749cab705e8dfb229fb4a8159d675d627ddd741733f6d06ca36b9987c3f8ea9f4d3fc61a9135dd18d3c7af176be124769f8

  • SSDEEP

    24576:Jy29JdP9SYg8rvouFInG4qc3+BbLMtuQ/dIkFSE9s31hV:825FSYggoIInGu42uqdIke31h

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe
    "C:\Users\Admin\AppData\Local\Temp\14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11EO0041.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11EO0041.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:4020
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:4984
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12Zu663.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12Zu663.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:5016
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              3⤵
                PID:3464

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11EO0041.exe

                  Filesize

                  1.1MB

                  MD5

                  7ce2856f7d27efaf76b33765a7859ad3

                  SHA1

                  292a9ac5216f71a8c9858169c46a1797b27e530d

                  SHA256

                  4dd502f1c6b2373660a1a9c0ed7114649ef9abb26d2812003c62a6dd98e4a205

                  SHA512

                  571221efa90160376e6cd6f6e7dca3a23bd194876cd952f387c7b663750ed6a9f4f017664ac0393dc80852261779f1f1b28ef0cb513e091b093c47caf7cb4de2

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11EO0041.exe

                  Filesize

                  1.1MB

                  MD5

                  7ce2856f7d27efaf76b33765a7859ad3

                  SHA1

                  292a9ac5216f71a8c9858169c46a1797b27e530d

                  SHA256

                  4dd502f1c6b2373660a1a9c0ed7114649ef9abb26d2812003c62a6dd98e4a205

                  SHA512

                  571221efa90160376e6cd6f6e7dca3a23bd194876cd952f387c7b663750ed6a9f4f017664ac0393dc80852261779f1f1b28ef0cb513e091b093c47caf7cb4de2

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12Zu663.exe

                  Filesize

                  2.4MB

                  MD5

                  cc91fef9c297d0fe5eb417c1afabc474

                  SHA1

                  6941d8209cadf07100606b65ca7b66eb8f47cd1f

                  SHA256

                  92bdf0c031747ef12099e9d371b82bf5370598ad47840af9f79e5f57627a589f

                  SHA512

                  a3248d0acb4488d3ee023dd2a1b9b53b6ef3cc1b2218a75a74d7c9231b34b045d773060251e018db23ef1f5b3244f78136aa2f2e9f10372fcea2ef9fac118c08

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12Zu663.exe

                  Filesize

                  2.4MB

                  MD5

                  cc91fef9c297d0fe5eb417c1afabc474

                  SHA1

                  6941d8209cadf07100606b65ca7b66eb8f47cd1f

                  SHA256

                  92bdf0c031747ef12099e9d371b82bf5370598ad47840af9f79e5f57627a589f

                  SHA512

                  a3248d0acb4488d3ee023dd2a1b9b53b6ef3cc1b2218a75a74d7c9231b34b045d773060251e018db23ef1f5b3244f78136aa2f2e9f10372fcea2ef9fac118c08

                • memory/3464-15-0x0000000000400000-0x0000000000547000-memory.dmp

                  Filesize

                  1.3MB

                • memory/3464-19-0x0000000000400000-0x0000000000547000-memory.dmp

                  Filesize

                  1.3MB

                • memory/3464-18-0x0000000000400000-0x0000000000547000-memory.dmp

                  Filesize

                  1.3MB

                • memory/3464-16-0x0000000000400000-0x0000000000547000-memory.dmp

                  Filesize

                  1.3MB

                • memory/3464-14-0x0000000000400000-0x0000000000547000-memory.dmp

                  Filesize

                  1.3MB

                • memory/4984-11-0x0000000074AB0000-0x0000000075260000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4984-13-0x00000000073E0000-0x0000000007472000-memory.dmp

                  Filesize

                  584KB

                • memory/4984-12-0x00000000078F0000-0x0000000007E94000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4984-7-0x0000000000400000-0x000000000043C000-memory.dmp

                  Filesize

                  240KB

                • memory/4984-20-0x0000000004E70000-0x0000000004E80000-memory.dmp

                  Filesize

                  64KB

                • memory/4984-21-0x0000000007570000-0x000000000757A000-memory.dmp

                  Filesize

                  40KB

                • memory/4984-22-0x00000000084C0000-0x0000000008AD8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/4984-23-0x0000000007720000-0x000000000782A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/4984-24-0x0000000007650000-0x0000000007662000-memory.dmp

                  Filesize

                  72KB

                • memory/4984-25-0x00000000076B0000-0x00000000076EC000-memory.dmp

                  Filesize

                  240KB

                • memory/4984-26-0x0000000007830000-0x000000000787C000-memory.dmp

                  Filesize

                  304KB

                • memory/4984-27-0x0000000074AB0000-0x0000000075260000-memory.dmp

                  Filesize

                  7.7MB