Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 10:08

General

  • Target

    b0d3a3660331ff8ff0504498edd9bff28eeb733ac6d718bd589cac5bf7c59855.exe

  • Size

    1.1MB

  • MD5

    dc72d7d70dae7741e434fff52b666bd2

  • SHA1

    4de1f74fcabeeee9bd171be7106862750c2de7ee

  • SHA256

    b0d3a3660331ff8ff0504498edd9bff28eeb733ac6d718bd589cac5bf7c59855

  • SHA512

    877cb3808259576e169e9bf5b0153e32f96fc9709f7adf0b8da29196a8940f87bd0c17ff8831d1f6da150f432bd666fb2b5053d813f660a2effaa417d44d8480

  • SSDEEP

    24576:oyaQeJ5nIkKw7t42YVCp4bLueYRbtY4Hp0klodN1lbsh:vaxnjKwGPy4ueY1tY4J0kly5

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0d3a3660331ff8ff0504498edd9bff28eeb733ac6d718bd589cac5bf7c59855.exe
    "C:\Users\Admin\AppData\Local\Temp\b0d3a3660331ff8ff0504498edd9bff28eeb733ac6d718bd589cac5bf7c59855.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11ux3896.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11ux3896.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4824
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:3036
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:1888
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12nG653.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12nG653.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:5116
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4220,i,16488180140590516186,11762960689811837350,262144 --variations-seed-version --mojo-platform-channel-handle=1280 /prefetch:8
          1⤵
            PID:4148

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11ux3896.exe

            Filesize

            1.1MB

            MD5

            f1b4403cbcf12c8e4836937145a6b931

            SHA1

            b4a9496f5f175e460e399139bf98a3bcde4a2db4

            SHA256

            7141ac55f767f8a1ec9df326863d66eeda5c5fa948c4d4d26b3ab4867e61628d

            SHA512

            a49efe5535bfc8e3ca23b9fcb85a85ad246d64cf58d6427a3f2a5da33a20e9d88012fbac067093fa05143f1d075e0121551f740c5f402f7616242778f656dc23

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12nG653.exe

            Filesize

            2.4MB

            MD5

            6dffcfdeca1c075c10fdede6f180565a

            SHA1

            f780493b22e0cadbe6642ccb3a20fc47235d6fc0

            SHA256

            b6a05e92e48451522b8196463c916cccc6d265199419d389c25ebaf4bdf971f3

            SHA512

            8bf4718a302a6c1d374c2507019ffc3732694473945917408d1880b83164b479f03f5acb45df02d50aaf16b330bf57cb21e5206b9757c363424d8012ff009130

          • memory/1888-16-0x00000000086C0000-0x0000000008CD8000-memory.dmp

            Filesize

            6.1MB

          • memory/1888-19-0x00000000077C0000-0x00000000077FC000-memory.dmp

            Filesize

            240KB

          • memory/1888-12-0x0000000007AF0000-0x0000000008094000-memory.dmp

            Filesize

            5.6MB

          • memory/1888-13-0x00000000075E0000-0x0000000007672000-memory.dmp

            Filesize

            584KB

          • memory/1888-14-0x0000000004B40000-0x0000000004B4A000-memory.dmp

            Filesize

            40KB

          • memory/1888-15-0x0000000073F30000-0x00000000746E0000-memory.dmp

            Filesize

            7.7MB

          • memory/1888-7-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/1888-18-0x00000000075C0000-0x00000000075D2000-memory.dmp

            Filesize

            72KB

          • memory/1888-17-0x00000000078D0000-0x00000000079DA000-memory.dmp

            Filesize

            1.0MB

          • memory/1888-10-0x0000000073F3E000-0x0000000073F3F000-memory.dmp

            Filesize

            4KB

          • memory/1888-27-0x0000000073F30000-0x00000000746E0000-memory.dmp

            Filesize

            7.7MB

          • memory/1888-20-0x0000000007800000-0x000000000784C000-memory.dmp

            Filesize

            304KB

          • memory/1888-26-0x0000000073F3E000-0x0000000073F3F000-memory.dmp

            Filesize

            4KB

          • memory/5116-24-0x0000000000400000-0x0000000000547000-memory.dmp

            Filesize

            1.3MB

          • memory/5116-22-0x0000000000400000-0x0000000000547000-memory.dmp

            Filesize

            1.3MB

          • memory/5116-25-0x0000000000400000-0x0000000000547000-memory.dmp

            Filesize

            1.3MB

          • memory/5116-21-0x0000000000400000-0x0000000000547000-memory.dmp

            Filesize

            1.3MB