Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
6e349cf64aa3fa330d1312bbdf0a158376282fd547c54fcabf75af777d93ae40.exe
Resource
win10v2004-20231023-en
General
-
Target
6e349cf64aa3fa330d1312bbdf0a158376282fd547c54fcabf75af777d93ae40.exe
-
Size
1.3MB
-
MD5
75164be06c9b8c73806036ab715788ec
-
SHA1
c13cf0913187995099d905514132bff25499117f
-
SHA256
6e349cf64aa3fa330d1312bbdf0a158376282fd547c54fcabf75af777d93ae40
-
SHA512
57dab7a3b4fe0a0a0f03fd89963255d7cdd50357466d8976a2cf2b01a199cf7398885f03b61b16b2a6803d7ae4adf29b3077f3c59501b16abfb5c2a32f2215bc
-
SSDEEP
24576:dysip47L/FL4zSGxulRZxDUodeuUUmZyc0yC9EOGSGeQVLACeswSp8j8jFRu:4sip4vF4zS4uv7DzdNwiyERGe0Acp8jQ
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/620-21-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 3lA31wi.exe -
Executes dropped EXE 4 IoCs
pid Process 3720 Yd0tA37.exe 2156 dG5pt10.exe 4472 2yS9534.exe 2100 3lA31wi.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e349cf64aa3fa330d1312bbdf0a158376282fd547c54fcabf75af777d93ae40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Yd0tA37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dG5pt10.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 3lA31wi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4472 set thread context of 620 4472 2yS9534.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1944 4472 WerFault.exe 87 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2088 schtasks.exe 1480 schtasks.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3720 1696 6e349cf64aa3fa330d1312bbdf0a158376282fd547c54fcabf75af777d93ae40.exe 84 PID 1696 wrote to memory of 3720 1696 6e349cf64aa3fa330d1312bbdf0a158376282fd547c54fcabf75af777d93ae40.exe 84 PID 1696 wrote to memory of 3720 1696 6e349cf64aa3fa330d1312bbdf0a158376282fd547c54fcabf75af777d93ae40.exe 84 PID 3720 wrote to memory of 2156 3720 Yd0tA37.exe 85 PID 3720 wrote to memory of 2156 3720 Yd0tA37.exe 85 PID 3720 wrote to memory of 2156 3720 Yd0tA37.exe 85 PID 2156 wrote to memory of 4472 2156 dG5pt10.exe 87 PID 2156 wrote to memory of 4472 2156 dG5pt10.exe 87 PID 2156 wrote to memory of 4472 2156 dG5pt10.exe 87 PID 4472 wrote to memory of 3956 4472 2yS9534.exe 99 PID 4472 wrote to memory of 3956 4472 2yS9534.exe 99 PID 4472 wrote to memory of 3956 4472 2yS9534.exe 99 PID 4472 wrote to memory of 620 4472 2yS9534.exe 100 PID 4472 wrote to memory of 620 4472 2yS9534.exe 100 PID 4472 wrote to memory of 620 4472 2yS9534.exe 100 PID 4472 wrote to memory of 620 4472 2yS9534.exe 100 PID 4472 wrote to memory of 620 4472 2yS9534.exe 100 PID 4472 wrote to memory of 620 4472 2yS9534.exe 100 PID 4472 wrote to memory of 620 4472 2yS9534.exe 100 PID 4472 wrote to memory of 620 4472 2yS9534.exe 100 PID 2156 wrote to memory of 2100 2156 dG5pt10.exe 104 PID 2156 wrote to memory of 2100 2156 dG5pt10.exe 104 PID 2156 wrote to memory of 2100 2156 dG5pt10.exe 104 PID 2100 wrote to memory of 1480 2100 3lA31wi.exe 105 PID 2100 wrote to memory of 1480 2100 3lA31wi.exe 105 PID 2100 wrote to memory of 1480 2100 3lA31wi.exe 105 PID 2100 wrote to memory of 2088 2100 3lA31wi.exe 107 PID 2100 wrote to memory of 2088 2100 3lA31wi.exe 107 PID 2100 wrote to memory of 2088 2100 3lA31wi.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e349cf64aa3fa330d1312bbdf0a158376282fd547c54fcabf75af777d93ae40.exe"C:\Users\Admin\AppData\Local\Temp\6e349cf64aa3fa330d1312bbdf0a158376282fd547c54fcabf75af777d93ae40.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yd0tA37.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yd0tA37.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dG5pt10.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dG5pt10.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2yS9534.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2yS9534.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 5965⤵
- Program crash
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3lA31wi.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3lA31wi.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:1480
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:2088
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4472 -ip 44721⤵PID:3992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55b2cad4c0169dde495dc5269005d3bcc
SHA1db70453183393cdf0471553100880c7c997f6415
SHA256898d76ae00e7ca0c0a79246712c2ca8dcd55c6b7e74201d47ca76576c317d9c4
SHA5120f9a6badcfbe8722a730fcef1b46e9055f4184e64946084319e2fe633ae141fdbb0b4609bd89103985b053668d9398d28da9115e8880232a9d08a20d1f944ca5
-
Filesize
1.0MB
MD57d57c9746c8f6657773c6f5ec57d1171
SHA17898100fa5f9188bb930e12be018823ee8f22033
SHA25602ab15a90c6ea43e3602e25d445e744831b58fec0c68ce102aeb03befd8b7799
SHA512779337b7cf1604024b091d7371455ab26afa5e17a23f37dc33fb1882d85002ceba47207259b875f373c78ce12d9a130c87ed4536d2e9a80b5f7c4d07bbca4bca
-
Filesize
1.0MB
MD57d57c9746c8f6657773c6f5ec57d1171
SHA17898100fa5f9188bb930e12be018823ee8f22033
SHA25602ab15a90c6ea43e3602e25d445e744831b58fec0c68ce102aeb03befd8b7799
SHA512779337b7cf1604024b091d7371455ab26afa5e17a23f37dc33fb1882d85002ceba47207259b875f373c78ce12d9a130c87ed4536d2e9a80b5f7c4d07bbca4bca
-
Filesize
948KB
MD56d3b5dab4a670c4cd370b992668f55c8
SHA14b9c866fb31648feafb91ad8cb01d6281ce5f09c
SHA2562efdb31e86d935292b0ac792dc679149bd7e62b49bf833d6cb53ba090d5852d1
SHA512913875a6a9bf65aed71592b8e72e1822ff7f3e1b5917776cd68860e13a0e8067c9442682ea2f9a211690bfbc4ec37ee537545ba5e3d428ecdfab9fdbfe2cbf58
-
Filesize
948KB
MD56d3b5dab4a670c4cd370b992668f55c8
SHA14b9c866fb31648feafb91ad8cb01d6281ce5f09c
SHA2562efdb31e86d935292b0ac792dc679149bd7e62b49bf833d6cb53ba090d5852d1
SHA512913875a6a9bf65aed71592b8e72e1822ff7f3e1b5917776cd68860e13a0e8067c9442682ea2f9a211690bfbc4ec37ee537545ba5e3d428ecdfab9fdbfe2cbf58
-
Filesize
1.1MB
MD5ccc0b1c201f669b140ef8ededc6c067f
SHA1fc17b5460dde431be809ac87a4ff03ce0ace822f
SHA2560ff3972c8fa3b9d9a950552a7901150caabf4134673e3a9e37eced114c7095ac
SHA512e6e22ab5bffcc8c8e5975cc9eb61a4f8ce2a4fc6c516c34223e53297a7a5876b88013aaa66a5f9694dd2717bad7d04ce66c0c890ef6dd1ebb4898039a2ebb680
-
Filesize
1.1MB
MD5ccc0b1c201f669b140ef8ededc6c067f
SHA1fc17b5460dde431be809ac87a4ff03ce0ace822f
SHA2560ff3972c8fa3b9d9a950552a7901150caabf4134673e3a9e37eced114c7095ac
SHA512e6e22ab5bffcc8c8e5975cc9eb61a4f8ce2a4fc6c516c34223e53297a7a5876b88013aaa66a5f9694dd2717bad7d04ce66c0c890ef6dd1ebb4898039a2ebb680
-
Filesize
1.3MB
MD55b2cad4c0169dde495dc5269005d3bcc
SHA1db70453183393cdf0471553100880c7c997f6415
SHA256898d76ae00e7ca0c0a79246712c2ca8dcd55c6b7e74201d47ca76576c317d9c4
SHA5120f9a6badcfbe8722a730fcef1b46e9055f4184e64946084319e2fe633ae141fdbb0b4609bd89103985b053668d9398d28da9115e8880232a9d08a20d1f944ca5
-
Filesize
1.3MB
MD55b2cad4c0169dde495dc5269005d3bcc
SHA1db70453183393cdf0471553100880c7c997f6415
SHA256898d76ae00e7ca0c0a79246712c2ca8dcd55c6b7e74201d47ca76576c317d9c4
SHA5120f9a6badcfbe8722a730fcef1b46e9055f4184e64946084319e2fe633ae141fdbb0b4609bd89103985b053668d9398d28da9115e8880232a9d08a20d1f944ca5