Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 10:02

General

  • Target

    14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe

  • Size

    1.1MB

  • MD5

    b0be87fbefa8fb816eda48b5873f30e6

  • SHA1

    580f46fb499394653f1c7a29a1bc0baccad32c0a

  • SHA256

    14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19

  • SHA512

    b7292045ce5adf9297dc9a4e68f9f749cab705e8dfb229fb4a8159d675d627ddd741733f6d06ca36b9987c3f8ea9f4d3fc61a9135dd18d3c7af176be124769f8

  • SSDEEP

    24576:Jy29JdP9SYg8rvouFInG4qc3+BbLMtuQ/dIkFSE9s31hV:825FSYggoIInGu42uqdIke31h

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe
    "C:\Users\Admin\AppData\Local\Temp\14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11EO0041.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11EO0041.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:2568
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12Zu663.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12Zu663.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4868
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:1708

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11EO0041.exe
        Filesize

        1.1MB

        MD5

        7ce2856f7d27efaf76b33765a7859ad3

        SHA1

        292a9ac5216f71a8c9858169c46a1797b27e530d

        SHA256

        4dd502f1c6b2373660a1a9c0ed7114649ef9abb26d2812003c62a6dd98e4a205

        SHA512

        571221efa90160376e6cd6f6e7dca3a23bd194876cd952f387c7b663750ed6a9f4f017664ac0393dc80852261779f1f1b28ef0cb513e091b093c47caf7cb4de2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12Zu663.exe
        Filesize

        2.4MB

        MD5

        cc91fef9c297d0fe5eb417c1afabc474

        SHA1

        6941d8209cadf07100606b65ca7b66eb8f47cd1f

        SHA256

        92bdf0c031747ef12099e9d371b82bf5370598ad47840af9f79e5f57627a589f

        SHA512

        a3248d0acb4488d3ee023dd2a1b9b53b6ef3cc1b2218a75a74d7c9231b34b045d773060251e018db23ef1f5b3244f78136aa2f2e9f10372fcea2ef9fac118c08

      • memory/1708-22-0x0000000000400000-0x0000000000547000-memory.dmp
        Filesize

        1.3MB

      • memory/1708-25-0x0000000000400000-0x0000000000547000-memory.dmp
        Filesize

        1.3MB

      • memory/1708-24-0x0000000000400000-0x0000000000547000-memory.dmp
        Filesize

        1.3MB

      • memory/1708-21-0x0000000000400000-0x0000000000547000-memory.dmp
        Filesize

        1.3MB

      • memory/2568-16-0x0000000008D40000-0x0000000009358000-memory.dmp
        Filesize

        6.1MB

      • memory/2568-15-0x0000000074970000-0x0000000075120000-memory.dmp
        Filesize

        7.7MB

      • memory/2568-14-0x00000000030E0000-0x00000000030EA000-memory.dmp
        Filesize

        40KB

      • memory/2568-17-0x0000000007F30000-0x000000000803A000-memory.dmp
        Filesize

        1.0MB

      • memory/2568-18-0x0000000007DA0000-0x0000000007DB2000-memory.dmp
        Filesize

        72KB

      • memory/2568-19-0x0000000007E20000-0x0000000007E5C000-memory.dmp
        Filesize

        240KB

      • memory/2568-20-0x0000000007E60000-0x0000000007EAC000-memory.dmp
        Filesize

        304KB

      • memory/2568-13-0x0000000007BC0000-0x0000000007C52000-memory.dmp
        Filesize

        584KB

      • memory/2568-12-0x0000000008170000-0x0000000008714000-memory.dmp
        Filesize

        5.6MB

      • memory/2568-10-0x000000007497E000-0x000000007497F000-memory.dmp
        Filesize

        4KB

      • memory/2568-7-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB

      • memory/2568-26-0x000000007497E000-0x000000007497F000-memory.dmp
        Filesize

        4KB

      • memory/2568-27-0x0000000074970000-0x0000000075120000-memory.dmp
        Filesize

        7.7MB