Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 10:44

General

  • Target

    812ce70322ec6814a763ebe1e04731ab416e10201580d509b133509ad1ebcb27.exe

  • Size

    829KB

  • MD5

    f9d1f262e72cc1b9b7e814dbdcc929cb

  • SHA1

    214d0685f60ef65b733722f3677ba255059f16d1

  • SHA256

    812ce70322ec6814a763ebe1e04731ab416e10201580d509b133509ad1ebcb27

  • SHA512

    7f2be6d8d4bf3d7f848c8b06c239428c8dfe3160686a66ff1ede13f9c834cbcf1c84db2d1dd02a12bea4586247ddfe605fcc956022ea12f3bf11e55ea7b3240d

  • SSDEEP

    12288:8MrGy90Mc6HGhgK/eguSNyEGXOTw4bFvzyyEXy5pkboFeVT00Fh6cWNrKIva:ayV3mhgOJwx+1bohX0YoOT00D6xNr0

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\812ce70322ec6814a763ebe1e04731ab416e10201580d509b133509ad1ebcb27.exe
    "C:\Users\Admin\AppData\Local\Temp\812ce70322ec6814a763ebe1e04731ab416e10201580d509b133509ad1ebcb27.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2AK9303.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2AK9303.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:2316
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3mG17hj.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3mG17hj.exe
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3400
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
          3⤵
          • Creates scheduled task(s)
          PID:1580
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
          3⤵
          • Creates scheduled task(s)
          PID:4724

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2AK9303.exe
      Filesize

      493KB

      MD5

      51598e6613e1cfc658a8a27795952fe9

      SHA1

      9dfd0765c993b8935e060097992cdeb5ba33547e

      SHA256

      19e8fa30d553a5cb3f2109cbb4e08ade0cbe3886cd81fe6e6da54c61ed62ad19

      SHA512

      37baf085c3d0998642bc3db35e0e6777a060027e0263bd1c7818ca8bb8010580613bc30da11abef37768f6dd795b1f56729e5a0db98d0862c2bc78375f31be53

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3mG17hj.exe
      Filesize

      1.3MB

      MD5

      84b375c6da427609a5b81d9fd32e213c

      SHA1

      aac9d06dbdf29b1fb219af496b4b2a9893b60f56

      SHA256

      1b6404664754b788c705dfb15c0319a3be3a7acdaf0e8318ebbe0735b1c74a32

      SHA512

      65fbb3314943e16f743e266438d16deba8c821e879d6baf0609646796f7e6ba834f53571c274d2e9e85df74db9904f81858679c9c3d564a556230e84a3e9951d

    • memory/2316-21-0x0000000004A40000-0x0000000004A4A000-memory.dmp
      Filesize

      40KB

    • memory/2316-11-0x0000000073FFE000-0x0000000073FFF000-memory.dmp
      Filesize

      4KB

    • memory/2316-18-0x00000000079E0000-0x0000000007F84000-memory.dmp
      Filesize

      5.6MB

    • memory/2316-19-0x00000000074D0000-0x0000000007562000-memory.dmp
      Filesize

      584KB

    • memory/2316-7-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/2316-24-0x00000000075E0000-0x00000000075F2000-memory.dmp
      Filesize

      72KB

    • memory/2316-23-0x0000000007F90000-0x000000000809A000-memory.dmp
      Filesize

      1.0MB

    • memory/2316-22-0x00000000085B0000-0x0000000008BC8000-memory.dmp
      Filesize

      6.1MB

    • memory/2316-25-0x0000000007650000-0x000000000768C000-memory.dmp
      Filesize

      240KB

    • memory/2316-26-0x0000000007690000-0x00000000076DC000-memory.dmp
      Filesize

      304KB

    • memory/2316-27-0x0000000073FFE000-0x0000000073FFF000-memory.dmp
      Filesize

      4KB