Analysis

  • max time kernel
    133s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 19:03

General

  • Target

    cd0d56c5cef765fb6cc44988f16cfea540a6eacff2349df1adde54d8bdf0ac15.exe

  • Size

    1.1MB

  • MD5

    27af7a4c719af0f00736750684474c33

  • SHA1

    03e8e393f661280826fbc7e7576e584d0f3a9113

  • SHA256

    cd0d56c5cef765fb6cc44988f16cfea540a6eacff2349df1adde54d8bdf0ac15

  • SHA512

    17daa6adef43ef520e97df98ce819c87bdc5a0c093233a6bfab264a16d7ba6fe6ba9fa5a9e00506de4b1fb0aa937efe388943bfdfe67c47c06cbaf31fabc53a6

  • SSDEEP

    24576:ry5DLDF4WsVdsl323tNupeEC4MI7WkuOUgyYKT57AZ5FG:eJLZObx3fIe6fykuN37APF

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd0d56c5cef765fb6cc44988f16cfea540a6eacff2349df1adde54d8bdf0ac15.exe
    "C:\Users\Admin\AppData\Local\Temp\cd0d56c5cef765fb6cc44988f16cfea540a6eacff2349df1adde54d8bdf0ac15.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11iC1627.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11iC1627.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:1300
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12vI527.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12vI527.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:720
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:2140

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11iC1627.exe

        Filesize

        1.1MB

        MD5

        7bdc43eea5f420847643a5c6d7d8148f

        SHA1

        9a4ea91e124b65b65dc6b0f32f36e9d4030dd804

        SHA256

        556e681890f8ba42150bf026f78e08085279272654482f3015a1539e66146f08

        SHA512

        929979bc9756769a4c499f06aec1c67fd206cb9ae21b003217184be7bc3448e16c80a7c19cfdf470c06aebe7d17543ad7226cc9ffd423897a02b276fffe51ffb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12vI527.exe

        Filesize

        2.4MB

        MD5

        617786f39d137442de90b81305e9f574

        SHA1

        72018811e58497bbe227f7af11441c2da0c9cf8e

        SHA256

        fc74737972cb37aa2577b8f08a0f0f53a628f743e7acce98451ff89a36ef51d7

        SHA512

        4306ae40325ab11733103c8665a0576efe470fb0cd2ac2c9449b902bd33508909db2e96143e8487bf1a7cef916ce56c50837415595edffaa9e6085c4d997126e

      • memory/1300-16-0x0000000008480000-0x0000000008A98000-memory.dmp

        Filesize

        6.1MB

      • memory/1300-20-0x0000000007660000-0x000000000769C000-memory.dmp

        Filesize

        240KB

      • memory/1300-12-0x00000000078B0000-0x0000000007E54000-memory.dmp

        Filesize

        5.6MB

      • memory/1300-13-0x00000000073E0000-0x0000000007472000-memory.dmp

        Filesize

        584KB

      • memory/1300-14-0x00000000748B0000-0x0000000075060000-memory.dmp

        Filesize

        7.7MB

      • memory/1300-15-0x0000000002820000-0x000000000282A000-memory.dmp

        Filesize

        40KB

      • memory/1300-7-0x0000000000400000-0x000000000043C000-memory.dmp

        Filesize

        240KB

      • memory/1300-19-0x00000000074D0000-0x00000000074E2000-memory.dmp

        Filesize

        72KB

      • memory/1300-18-0x0000000007730000-0x000000000783A000-memory.dmp

        Filesize

        1.0MB

      • memory/1300-10-0x00000000748BE000-0x00000000748BF000-memory.dmp

        Filesize

        4KB

      • memory/1300-27-0x00000000748B0000-0x0000000075060000-memory.dmp

        Filesize

        7.7MB

      • memory/1300-25-0x00000000076A0000-0x00000000076EC000-memory.dmp

        Filesize

        304KB

      • memory/1300-26-0x00000000748BE000-0x00000000748BF000-memory.dmp

        Filesize

        4KB

      • memory/2140-23-0x0000000000400000-0x0000000000547000-memory.dmp

        Filesize

        1.3MB

      • memory/2140-21-0x0000000000400000-0x0000000000547000-memory.dmp

        Filesize

        1.3MB

      • memory/2140-24-0x0000000000400000-0x0000000000547000-memory.dmp

        Filesize

        1.3MB

      • memory/2140-17-0x0000000000400000-0x0000000000547000-memory.dmp

        Filesize

        1.3MB