Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 19:03

General

  • Target

    37d87e8c1add733f6b0f726eb97fd64542de486c7b60c80ffabe798eb6c54a0c.exe

  • Size

    1.1MB

  • MD5

    2c94ca6b9e68f23873d291cc5de452d7

  • SHA1

    427dd5a76b3cc7cf997f49fc699a9c37a2a90298

  • SHA256

    37d87e8c1add733f6b0f726eb97fd64542de486c7b60c80ffabe798eb6c54a0c

  • SHA512

    21c5fc9e942ad544132204ac52853f49f1c895e82f9caef58c85c72bcfd463911e7feea071b6caa8c5c0f691c12c660d3509ccd3de49df25378a818cf122e174

  • SSDEEP

    24576:Vyh2xPiliqDSXAwlKOiht4hZu78PnoF2rRCft2:wUPibSXA2Kpt4hZBPnoF6kft

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37d87e8c1add733f6b0f726eb97fd64542de486c7b60c80ffabe798eb6c54a0c.exe
    "C:\Users\Admin\AppData\Local\Temp\37d87e8c1add733f6b0f726eb97fd64542de486c7b60c80ffabe798eb6c54a0c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11fy6731.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11fy6731.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:2424
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12DE919.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12DE919.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:3732
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:3552

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11fy6731.exe

          Filesize

          1.1MB

          MD5

          4ea0d1e99dbb4a7d756b87de9d37e04d

          SHA1

          59ed231a849108d4e5d5f4df6deb0e1daa482177

          SHA256

          aa014769215101515e5799a4748f68920e25ca83e4e7d07487712fd7bca18574

          SHA512

          9e3cce1d79d22a9497e23d50e6f37c5c2e84cafd9233560cb5d8cfb41642310b389a08ef57da72378ae4e2494a1817d92826ac246f43413fa2ee9c98d3c36ee2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12DE919.exe

          Filesize

          2.4MB

          MD5

          edfc532a7f15f4e5a65938ad5f292ae4

          SHA1

          1b9df13618142979972099a1cd3a2b34ed3c6431

          SHA256

          82d3cb16bd3032d1ed9b77e999d9d054f4ee138e5074ff09293717be69aff722

          SHA512

          241f77ee2ee886f92e0386596f3f3afd596aa2853581f270e607d43904ad944f05fbb248c86b1e5e47a97e71555627e48d268cd7b05379ef689fffae25a24c55

        • memory/2424-16-0x0000000008B20000-0x0000000009138000-memory.dmp

          Filesize

          6.1MB

        • memory/2424-19-0x0000000007CA0000-0x0000000007CDC000-memory.dmp

          Filesize

          240KB

        • memory/2424-12-0x0000000007F50000-0x00000000084F4000-memory.dmp

          Filesize

          5.6MB

        • memory/2424-13-0x0000000007A40000-0x0000000007AD2000-memory.dmp

          Filesize

          584KB

        • memory/2424-15-0x0000000073F10000-0x00000000746C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2424-14-0x0000000001370000-0x000000000137A000-memory.dmp

          Filesize

          40KB

        • memory/2424-7-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2424-17-0x0000000007DB0000-0x0000000007EBA000-memory.dmp

          Filesize

          1.0MB

        • memory/2424-18-0x0000000007C00000-0x0000000007C12000-memory.dmp

          Filesize

          72KB

        • memory/2424-10-0x0000000073F1E000-0x0000000073F1F000-memory.dmp

          Filesize

          4KB

        • memory/2424-20-0x0000000007C30000-0x0000000007C7C000-memory.dmp

          Filesize

          304KB

        • memory/2424-27-0x0000000073F10000-0x00000000746C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2424-26-0x0000000073F1E000-0x0000000073F1F000-memory.dmp

          Filesize

          4KB

        • memory/3552-24-0x0000000000400000-0x0000000000547000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-25-0x0000000000400000-0x0000000000547000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-23-0x0000000000400000-0x0000000000547000-memory.dmp

          Filesize

          1.3MB

        • memory/3552-21-0x0000000000400000-0x0000000000547000-memory.dmp

          Filesize

          1.3MB