Analysis
-
max time kernel
131s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 10:47
Static task
static1
Behavioral task
behavioral1
Sample
f481075cb1f883156cebe55be87d38811ffbb89b82ede18be933761afdbc0f46.exe
Resource
win10v2004-20231023-en
General
-
Target
f481075cb1f883156cebe55be87d38811ffbb89b82ede18be933761afdbc0f46.exe
-
Size
1.1MB
-
MD5
b81255811776e073c6b7eb0f795fa374
-
SHA1
f41680b8064fa21d7532a7d8cae68588e0d9301f
-
SHA256
f481075cb1f883156cebe55be87d38811ffbb89b82ede18be933761afdbc0f46
-
SHA512
ad2bd79bfc8f5776a43ff6228046a1420255ac823af765cdc890c0449a94483d6313a6150b2d87c5156201e2c09d75e7572fa8d0ec5ff8e870bf770060574121
-
SSDEEP
24576:tyoLV7cwmlCvGodI2cV5hije3Hho7iFHCQ2MeF:IWV7IlCv5q5hWeXhx9u
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/4172-21-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 3ei49WE.exe -
Executes dropped EXE 4 IoCs
pid Process 4488 qA8To57.exe 392 GA8ZE28.exe 1968 2cN7076.exe 4984 3ei49WE.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f481075cb1f883156cebe55be87d38811ffbb89b82ede18be933761afdbc0f46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" qA8To57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" GA8ZE28.exe Set value (str) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 3ei49WE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1968 set thread context of 4172 1968 2cN7076.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4500 1968 WerFault.exe 89 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2108 schtasks.exe 2880 schtasks.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4228 wrote to memory of 4488 4228 f481075cb1f883156cebe55be87d38811ffbb89b82ede18be933761afdbc0f46.exe 86 PID 4228 wrote to memory of 4488 4228 f481075cb1f883156cebe55be87d38811ffbb89b82ede18be933761afdbc0f46.exe 86 PID 4228 wrote to memory of 4488 4228 f481075cb1f883156cebe55be87d38811ffbb89b82ede18be933761afdbc0f46.exe 86 PID 4488 wrote to memory of 392 4488 qA8To57.exe 88 PID 4488 wrote to memory of 392 4488 qA8To57.exe 88 PID 4488 wrote to memory of 392 4488 qA8To57.exe 88 PID 392 wrote to memory of 1968 392 GA8ZE28.exe 89 PID 392 wrote to memory of 1968 392 GA8ZE28.exe 89 PID 392 wrote to memory of 1968 392 GA8ZE28.exe 89 PID 1968 wrote to memory of 4172 1968 2cN7076.exe 100 PID 1968 wrote to memory of 4172 1968 2cN7076.exe 100 PID 1968 wrote to memory of 4172 1968 2cN7076.exe 100 PID 1968 wrote to memory of 4172 1968 2cN7076.exe 100 PID 1968 wrote to memory of 4172 1968 2cN7076.exe 100 PID 1968 wrote to memory of 4172 1968 2cN7076.exe 100 PID 1968 wrote to memory of 4172 1968 2cN7076.exe 100 PID 1968 wrote to memory of 4172 1968 2cN7076.exe 100 PID 392 wrote to memory of 4984 392 GA8ZE28.exe 104 PID 392 wrote to memory of 4984 392 GA8ZE28.exe 104 PID 392 wrote to memory of 4984 392 GA8ZE28.exe 104 PID 4984 wrote to memory of 2108 4984 3ei49WE.exe 105 PID 4984 wrote to memory of 2108 4984 3ei49WE.exe 105 PID 4984 wrote to memory of 2108 4984 3ei49WE.exe 105 PID 4984 wrote to memory of 2880 4984 3ei49WE.exe 107 PID 4984 wrote to memory of 2880 4984 3ei49WE.exe 107 PID 4984 wrote to memory of 2880 4984 3ei49WE.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\f481075cb1f883156cebe55be87d38811ffbb89b82ede18be933761afdbc0f46.exe"C:\Users\Admin\AppData\Local\Temp\f481075cb1f883156cebe55be87d38811ffbb89b82ede18be933761afdbc0f46.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qA8To57.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qA8To57.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\GA8ZE28.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\GA8ZE28.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2cN7076.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2cN7076.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 5925⤵
- Program crash
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3ei49WE.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3ei49WE.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:2108
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:2880
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1968 -ip 19681⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD580438888b87e0700e2faf8d025504965
SHA1529b20080d64592260dee4471f3faff74e60dcb2
SHA256481c0eb210c52116cec598a7cc212f7715eb47a72dfc4050a4671b51db996997
SHA512f0df5befc7025f488d037cb819369255fd6b2ab01e7c35246c7f7654eeb16d4f8c136b7483ff50a8431b776b38315f25e807a58c1e63379565526d4ae320e286
-
Filesize
935KB
MD515b42f9e7eb6995b2c98415bb59c1e3e
SHA17592b1212205ca5bf5713c9403ad3ba934acbefe
SHA256642b611b7d16d85543372d616cf888a55e55ebe46d1a6d1753be455b775e5082
SHA512a8ff278585b3202eea31b6f8a4493175383c30fa8aca22eb240f2507d26ca6d4e6585b0eceb8fdcba4bea5e2524ae232d4a2e53f30f03d1c9d5583e8f8db58fa
-
Filesize
935KB
MD515b42f9e7eb6995b2c98415bb59c1e3e
SHA17592b1212205ca5bf5713c9403ad3ba934acbefe
SHA256642b611b7d16d85543372d616cf888a55e55ebe46d1a6d1753be455b775e5082
SHA512a8ff278585b3202eea31b6f8a4493175383c30fa8aca22eb240f2507d26ca6d4e6585b0eceb8fdcba4bea5e2524ae232d4a2e53f30f03d1c9d5583e8f8db58fa
-
Filesize
811KB
MD59743964873901812b12fea227a958f69
SHA14467f55a373d7bbcfcd75cbf47180b8c0063bf13
SHA25617c59edeb8741d2e5f3148d295fb30a50ebed1c34c8bcbab35be63720dfda9e4
SHA512868e9a57cdfad13355745554868dcaa5640534344d3c336de17d5a8e83ee0aea0621885215eef22a33377e94077caac23d95afc855e355730eb1f60af48c2a49
-
Filesize
811KB
MD59743964873901812b12fea227a958f69
SHA14467f55a373d7bbcfcd75cbf47180b8c0063bf13
SHA25617c59edeb8741d2e5f3148d295fb30a50ebed1c34c8bcbab35be63720dfda9e4
SHA512868e9a57cdfad13355745554868dcaa5640534344d3c336de17d5a8e83ee0aea0621885215eef22a33377e94077caac23d95afc855e355730eb1f60af48c2a49
-
Filesize
432KB
MD55e3b76c1fecb99dd1c4da6aa00dee18a
SHA1e4b0d97131a1aa4ce371566d86578ab2de2594c5
SHA256e3e975e3ea99cf94e9ef149f44f04e000594d5b9bbd6bd1c6673a3758e5a6e8c
SHA512ea33f21044157587c9844a0e932323865f705cee36e1f9ed81f85963cd741e80db270d0ff54466fdaa7b26c4bf981b0e3d8cf48fcfcd10c69d07dc534bae897d
-
Filesize
432KB
MD55e3b76c1fecb99dd1c4da6aa00dee18a
SHA1e4b0d97131a1aa4ce371566d86578ab2de2594c5
SHA256e3e975e3ea99cf94e9ef149f44f04e000594d5b9bbd6bd1c6673a3758e5a6e8c
SHA512ea33f21044157587c9844a0e932323865f705cee36e1f9ed81f85963cd741e80db270d0ff54466fdaa7b26c4bf981b0e3d8cf48fcfcd10c69d07dc534bae897d
-
Filesize
1.3MB
MD580438888b87e0700e2faf8d025504965
SHA1529b20080d64592260dee4471f3faff74e60dcb2
SHA256481c0eb210c52116cec598a7cc212f7715eb47a72dfc4050a4671b51db996997
SHA512f0df5befc7025f488d037cb819369255fd6b2ab01e7c35246c7f7654eeb16d4f8c136b7483ff50a8431b776b38315f25e807a58c1e63379565526d4ae320e286
-
Filesize
1.3MB
MD580438888b87e0700e2faf8d025504965
SHA1529b20080d64592260dee4471f3faff74e60dcb2
SHA256481c0eb210c52116cec598a7cc212f7715eb47a72dfc4050a4671b51db996997
SHA512f0df5befc7025f488d037cb819369255fd6b2ab01e7c35246c7f7654eeb16d4f8c136b7483ff50a8431b776b38315f25e807a58c1e63379565526d4ae320e286