Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:50

General

  • Target

    37d87e8c1add733f6b0f726eb97fd64542de486c7b60c80ffabe798eb6c54a0c.exe

  • Size

    1.1MB

  • MD5

    2c94ca6b9e68f23873d291cc5de452d7

  • SHA1

    427dd5a76b3cc7cf997f49fc699a9c37a2a90298

  • SHA256

    37d87e8c1add733f6b0f726eb97fd64542de486c7b60c80ffabe798eb6c54a0c

  • SHA512

    21c5fc9e942ad544132204ac52853f49f1c895e82f9caef58c85c72bcfd463911e7feea071b6caa8c5c0f691c12c660d3509ccd3de49df25378a818cf122e174

  • SSDEEP

    24576:Vyh2xPiliqDSXAwlKOiht4hZu78PnoF2rRCft2:wUPibSXA2Kpt4hZBPnoF6kft

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37d87e8c1add733f6b0f726eb97fd64542de486c7b60c80ffabe798eb6c54a0c.exe
    "C:\Users\Admin\AppData\Local\Temp\37d87e8c1add733f6b0f726eb97fd64542de486c7b60c80ffabe798eb6c54a0c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11fy6731.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11fy6731.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:3772
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12DE919.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12DE919.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4572
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:5060

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11fy6731.exe
        Filesize

        1.1MB

        MD5

        4ea0d1e99dbb4a7d756b87de9d37e04d

        SHA1

        59ed231a849108d4e5d5f4df6deb0e1daa482177

        SHA256

        aa014769215101515e5799a4748f68920e25ca83e4e7d07487712fd7bca18574

        SHA512

        9e3cce1d79d22a9497e23d50e6f37c5c2e84cafd9233560cb5d8cfb41642310b389a08ef57da72378ae4e2494a1817d92826ac246f43413fa2ee9c98d3c36ee2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12DE919.exe
        Filesize

        2.4MB

        MD5

        edfc532a7f15f4e5a65938ad5f292ae4

        SHA1

        1b9df13618142979972099a1cd3a2b34ed3c6431

        SHA256

        82d3cb16bd3032d1ed9b77e999d9d054f4ee138e5074ff09293717be69aff722

        SHA512

        241f77ee2ee886f92e0386596f3f3afd596aa2853581f270e607d43904ad944f05fbb248c86b1e5e47a97e71555627e48d268cd7b05379ef689fffae25a24c55

      • memory/3772-16-0x0000000008370000-0x0000000008988000-memory.dmp
        Filesize

        6.1MB

      • memory/3772-19-0x0000000007580000-0x00000000075BC000-memory.dmp
        Filesize

        240KB

      • memory/3772-12-0x00000000077A0000-0x0000000007D44000-memory.dmp
        Filesize

        5.6MB

      • memory/3772-13-0x00000000072F0000-0x0000000007382000-memory.dmp
        Filesize

        584KB

      • memory/3772-14-0x0000000004890000-0x000000000489A000-memory.dmp
        Filesize

        40KB

      • memory/3772-15-0x0000000074390000-0x0000000074B40000-memory.dmp
        Filesize

        7.7MB

      • memory/3772-7-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB

      • memory/3772-17-0x0000000007D50000-0x0000000007E5A000-memory.dmp
        Filesize

        1.0MB

      • memory/3772-18-0x0000000007520000-0x0000000007532000-memory.dmp
        Filesize

        72KB

      • memory/3772-8-0x000000007439E000-0x000000007439F000-memory.dmp
        Filesize

        4KB

      • memory/3772-20-0x00000000075D0000-0x000000000761C000-memory.dmp
        Filesize

        304KB

      • memory/3772-27-0x0000000074390000-0x0000000074B40000-memory.dmp
        Filesize

        7.7MB

      • memory/3772-26-0x000000007439E000-0x000000007439F000-memory.dmp
        Filesize

        4KB

      • memory/5060-25-0x0000000000400000-0x0000000000547000-memory.dmp
        Filesize

        1.3MB

      • memory/5060-22-0x0000000000400000-0x0000000000547000-memory.dmp
        Filesize

        1.3MB

      • memory/5060-24-0x0000000000400000-0x0000000000547000-memory.dmp
        Filesize

        1.3MB

      • memory/5060-21-0x0000000000400000-0x0000000000547000-memory.dmp
        Filesize

        1.3MB