Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
22-11-2023 08:40
Static task
static1
Behavioral task
behavioral1
Sample
9c670dbe614fbf0dbc4572636b7fc66e481a1d3424db413886e81fab2097f69a.exe
Resource
win10-20231020-en
General
-
Target
9c670dbe614fbf0dbc4572636b7fc66e481a1d3424db413886e81fab2097f69a.exe
-
Size
1.4MB
-
MD5
2c47b3360d7958204132df411ceb1a13
-
SHA1
af41aa4fc7b87f5fc85f4dcbc7e4f259adcfd00b
-
SHA256
9c670dbe614fbf0dbc4572636b7fc66e481a1d3424db413886e81fab2097f69a
-
SHA512
450eeb2c7d43f87640c056c55f8d55c6d7f33f24ff9dacc73749eec485528397e92999caa2f6879be147b5498c4d166a0516e230fbefb970b5c6c742c25bb187
-
SSDEEP
24576:syTxeznFwlIAWB39fFcmB7lzXO1rYbVYCOSz8X1r67A2MhjidPaJ:b1eraIAM9NcURzXO1ruDhG1GszUdC
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/5032-21-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 3bx80Eb.exe -
Executes dropped EXE 4 IoCs
pid Process 2240 hh5MB22.exe 4112 hy6Eh16.exe 4576 2Fk1975.exe 660 3bx80Eb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c670dbe614fbf0dbc4572636b7fc66e481a1d3424db413886e81fab2097f69a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" hh5MB22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" hy6Eh16.exe Set value (str) \REGISTRY\USER\S-1-5-21-2508097367-364665605-1201309312-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 3bx80Eb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4576 set thread context of 5032 4576 2Fk1975.exe 75 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1084 schtasks.exe 2228 schtasks.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3872 wrote to memory of 2240 3872 9c670dbe614fbf0dbc4572636b7fc66e481a1d3424db413886e81fab2097f69a.exe 71 PID 3872 wrote to memory of 2240 3872 9c670dbe614fbf0dbc4572636b7fc66e481a1d3424db413886e81fab2097f69a.exe 71 PID 3872 wrote to memory of 2240 3872 9c670dbe614fbf0dbc4572636b7fc66e481a1d3424db413886e81fab2097f69a.exe 71 PID 2240 wrote to memory of 4112 2240 hh5MB22.exe 72 PID 2240 wrote to memory of 4112 2240 hh5MB22.exe 72 PID 2240 wrote to memory of 4112 2240 hh5MB22.exe 72 PID 4112 wrote to memory of 4576 4112 hy6Eh16.exe 73 PID 4112 wrote to memory of 4576 4112 hy6Eh16.exe 73 PID 4112 wrote to memory of 4576 4112 hy6Eh16.exe 73 PID 4576 wrote to memory of 5032 4576 2Fk1975.exe 75 PID 4576 wrote to memory of 5032 4576 2Fk1975.exe 75 PID 4576 wrote to memory of 5032 4576 2Fk1975.exe 75 PID 4576 wrote to memory of 5032 4576 2Fk1975.exe 75 PID 4576 wrote to memory of 5032 4576 2Fk1975.exe 75 PID 4576 wrote to memory of 5032 4576 2Fk1975.exe 75 PID 4576 wrote to memory of 5032 4576 2Fk1975.exe 75 PID 4576 wrote to memory of 5032 4576 2Fk1975.exe 75 PID 4112 wrote to memory of 660 4112 hy6Eh16.exe 76 PID 4112 wrote to memory of 660 4112 hy6Eh16.exe 76 PID 4112 wrote to memory of 660 4112 hy6Eh16.exe 76 PID 660 wrote to memory of 1084 660 3bx80Eb.exe 77 PID 660 wrote to memory of 1084 660 3bx80Eb.exe 77 PID 660 wrote to memory of 1084 660 3bx80Eb.exe 77 PID 660 wrote to memory of 2228 660 3bx80Eb.exe 79 PID 660 wrote to memory of 2228 660 3bx80Eb.exe 79 PID 660 wrote to memory of 2228 660 3bx80Eb.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c670dbe614fbf0dbc4572636b7fc66e481a1d3424db413886e81fab2097f69a.exe"C:\Users\Admin\AppData\Local\Temp\9c670dbe614fbf0dbc4572636b7fc66e481a1d3424db413886e81fab2097f69a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hh5MB22.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hh5MB22.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hy6Eh16.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hy6Eh16.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Fk1975.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Fk1975.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:5032
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3bx80Eb.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3bx80Eb.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:1084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:2228
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD566afa84943c39a414af598cedeaa2fe6
SHA1a59403c6dd47efe9e6fce0acb17a2a4765720f3c
SHA256b0f017c679a393518e605091ed049396a804fd35007b0b2384211dfd3b3e66e5
SHA512452dafd2571d506dad0996985e0c24a6bb4bf4efe96978c80007fb852999de2081789f8184e728f8eaf6f0e358789fee16eeeb4acb5a90c84accb0b32cef389e
-
Filesize
1.2MB
MD5756204012e70333c786b7f6d86d297eb
SHA170f598469492578240029ea13183129e8c544ced
SHA2562dc3a3be6f4a4408a40508c3a311cae035c272f501195d3c9d4dde92b623663d
SHA5127953180f4422dced4339e47d0322f2a7753098fe10b5d138baab8eea438ee27f81eccec0a7aff6c6b91b0fc6673baac8845b8c4f7399c38a425faa58cd0dac5e
-
Filesize
1.2MB
MD5756204012e70333c786b7f6d86d297eb
SHA170f598469492578240029ea13183129e8c544ced
SHA2562dc3a3be6f4a4408a40508c3a311cae035c272f501195d3c9d4dde92b623663d
SHA5127953180f4422dced4339e47d0322f2a7753098fe10b5d138baab8eea438ee27f81eccec0a7aff6c6b91b0fc6673baac8845b8c4f7399c38a425faa58cd0dac5e
-
Filesize
1.1MB
MD58d9f54d0ab2824d2e28cbd780e5ef219
SHA16eae6d5ff95f7047c261f5daa293235505a30b30
SHA2565bd1873d2d0ef5988185f9168cbb8a3c57a7a5ccfd2c91a22a97fb4764099e73
SHA5122c1c4c41ac9bb692e6ea10431387b99ce6735ab4c9f700372230b66d677f93647e36d6032e521b1b51287672a989b64e952154f1e23391c00e09e63914515c91
-
Filesize
1.1MB
MD58d9f54d0ab2824d2e28cbd780e5ef219
SHA16eae6d5ff95f7047c261f5daa293235505a30b30
SHA2565bd1873d2d0ef5988185f9168cbb8a3c57a7a5ccfd2c91a22a97fb4764099e73
SHA5122c1c4c41ac9bb692e6ea10431387b99ce6735ab4c9f700372230b66d677f93647e36d6032e521b1b51287672a989b64e952154f1e23391c00e09e63914515c91
-
Filesize
1.9MB
MD53aea83cf875425205423271620f5e83f
SHA1e46b7a8aa171e93fa71f9ffa355c27576f02ee76
SHA256b8a3e9eb3ad4eb8ba17e6014f919ec6568951be76575d6f1448cfa9f6f977cd6
SHA512e35713657e5773ff1e8e851c027e2528476c5eaf601c6e38df475e7b7265ef87824764e17168a88b95cbc65dac830c84c12f640f7769fa19207c3cb106108536
-
Filesize
1.9MB
MD53aea83cf875425205423271620f5e83f
SHA1e46b7a8aa171e93fa71f9ffa355c27576f02ee76
SHA256b8a3e9eb3ad4eb8ba17e6014f919ec6568951be76575d6f1448cfa9f6f977cd6
SHA512e35713657e5773ff1e8e851c027e2528476c5eaf601c6e38df475e7b7265ef87824764e17168a88b95cbc65dac830c84c12f640f7769fa19207c3cb106108536
-
Filesize
1.3MB
MD566afa84943c39a414af598cedeaa2fe6
SHA1a59403c6dd47efe9e6fce0acb17a2a4765720f3c
SHA256b0f017c679a393518e605091ed049396a804fd35007b0b2384211dfd3b3e66e5
SHA512452dafd2571d506dad0996985e0c24a6bb4bf4efe96978c80007fb852999de2081789f8184e728f8eaf6f0e358789fee16eeeb4acb5a90c84accb0b32cef389e
-
Filesize
1.3MB
MD566afa84943c39a414af598cedeaa2fe6
SHA1a59403c6dd47efe9e6fce0acb17a2a4765720f3c
SHA256b0f017c679a393518e605091ed049396a804fd35007b0b2384211dfd3b3e66e5
SHA512452dafd2571d506dad0996985e0c24a6bb4bf4efe96978c80007fb852999de2081789f8184e728f8eaf6f0e358789fee16eeeb4acb5a90c84accb0b32cef389e