Overview
overview
10Static
static
302fdf4c910...66.exe
windows10-2004-x64
100be251d0ab...8e.exe
windows10-2004-x64
100e80ad3a8f...f6.exe
windows10-2004-x64
1016688c383c...d0.exe
windows10-2004-x64
102fad2d07bb...73.exe
windows10-2004-x64
102fe920abb6...a6.exe
windows10-2004-x64
1048143dd10c...4c.exe
windows10-2004-x64
104b7ea12db6...e4.exe
windows10-2004-x64
1052365e9025...44.exe
windows10-2004-x64
10695cd347d1...6a.exe
windows10-2004-x64
1087139651e5...22.exe
windows10-2004-x64
109e061347f6...86.exe
windows10-2004-x64
109ec41d0e12...a4.exe
windows10-2004-x64
10a68d0534de...a7.exe
windows10-2004-x64
10b480c9cd31...f3.exe
windows10-2004-x64
10cf449b541f...5e.exe
windows10-2004-x64
10d8a34be272...bd.exe
windows10-2004-x64
7e303858850...2c.exe
windows10-2004-x64
10feb3084f5c...99.exe
windows10-2004-x64
10ff0593e795...5f.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
02fdf4c9103ebcca7b26adc9161a504fa42c4a825a66d1c39221891576c0f866.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0be251d0ab9bbcdf4e410ed6872fcb32d854da896cf79b561b30639bf6d7c48e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
0e80ad3a8f8f885a60f3f6210a2c5e9d2cb05a18b779d36f8aae8206aebbf0f6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2fad2d07bb60b8be9b65ca9944135ee7696d7d2d8b32cdd3b5cf49e79641ae73.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2fe920abb67663cc154599076d351357cc5282ac2505d5c20990fb89b97853a6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
48143dd10cb17672737bf39325eefbced2eac21f1831cda9176650d72814984c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4b7ea12db629e57826906a92344722cd83a635004026635b2ca16c24e67dbde4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
52365e902526bb91828ec4b8904240033cb658cf61b7ec8ee9189f96d3e93e44.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
695cd347d1d92d0b9066594b4970367e5d1c92c1b9b4885e6615432f165fc26a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
87139651e5e0bbbfe1bfa2f0a0607e9be351dbd75ab76f7846f919648224e922.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9e061347f64310d6e4bee03e70c36999f9e81fbcbba43f870f821e4fff10c686.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
a68d0534deb0e389e03aa786911c769caba8ce5acc03a27e3cfadf2a704811a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b480c9cd314e4d7d6a5d2b82b815eaccf37a30106d4a7f50993c34d6bd3466f3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d8a34be272e0dbfba0df5744bafa235f27121e065c13cb3620946ea7d15898bd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
ff0593e795d855d33fe8872b94c0354d60cb3bf24a1af92da6667c6aec50325f.exe
Resource
win10v2004-20240508-en
General
-
Target
16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe
-
Size
1.4MB
-
MD5
c2b04fbeb2611c15bdb5a55b47bb6675
-
SHA1
2c21a5848c237d1fd171cd788e5c4a0bf9b990fc
-
SHA256
16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0
-
SHA512
1769369ad7a8d445ba23da9c1aadb065101bca1656329eb454f64414eab873be895df470fd571e8777fc5836a3e4cc82a0e7798f85321efe8de2a003243d1e26
-
SSDEEP
24576:XyJ+jSTeTLVcPbco+tQAx69bZfkYzP89dkQHnCAys50R8IH:iJ+jSTeTL+PbUnExU3CAsR8
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral4/memory/1468-21-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 3RJ81vb.exe -
Executes dropped EXE 4 IoCs
pid Process 4504 hq2OZ35.exe 2412 Sx8Ym41.exe 1064 2gy7268.exe 2904 3RJ81vb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" hq2OZ35.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Sx8Ym41.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 3RJ81vb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1064 set thread context of 1468 1064 2gy7268.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5000 schtasks.exe 2576 schtasks.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4504 4716 16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe 84 PID 4716 wrote to memory of 4504 4716 16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe 84 PID 4716 wrote to memory of 4504 4716 16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe 84 PID 4504 wrote to memory of 2412 4504 hq2OZ35.exe 85 PID 4504 wrote to memory of 2412 4504 hq2OZ35.exe 85 PID 4504 wrote to memory of 2412 4504 hq2OZ35.exe 85 PID 2412 wrote to memory of 1064 2412 Sx8Ym41.exe 86 PID 2412 wrote to memory of 1064 2412 Sx8Ym41.exe 86 PID 2412 wrote to memory of 1064 2412 Sx8Ym41.exe 86 PID 1064 wrote to memory of 1468 1064 2gy7268.exe 100 PID 1064 wrote to memory of 1468 1064 2gy7268.exe 100 PID 1064 wrote to memory of 1468 1064 2gy7268.exe 100 PID 1064 wrote to memory of 1468 1064 2gy7268.exe 100 PID 1064 wrote to memory of 1468 1064 2gy7268.exe 100 PID 1064 wrote to memory of 1468 1064 2gy7268.exe 100 PID 1064 wrote to memory of 1468 1064 2gy7268.exe 100 PID 1064 wrote to memory of 1468 1064 2gy7268.exe 100 PID 2412 wrote to memory of 2904 2412 Sx8Ym41.exe 101 PID 2412 wrote to memory of 2904 2412 Sx8Ym41.exe 101 PID 2412 wrote to memory of 2904 2412 Sx8Ym41.exe 101 PID 2904 wrote to memory of 5000 2904 3RJ81vb.exe 102 PID 2904 wrote to memory of 5000 2904 3RJ81vb.exe 102 PID 2904 wrote to memory of 5000 2904 3RJ81vb.exe 102 PID 2904 wrote to memory of 2576 2904 3RJ81vb.exe 104 PID 2904 wrote to memory of 2576 2904 3RJ81vb.exe 104 PID 2904 wrote to memory of 2576 2904 3RJ81vb.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe"C:\Users\Admin\AppData\Local\Temp\16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hq2OZ35.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hq2OZ35.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sx8Ym41.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sx8Ym41.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2gy7268.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2gy7268.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1468
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3RJ81vb.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3RJ81vb.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:5000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:2576
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52d0c662657f8e4e86cda4ffebac880e2
SHA1030ea4f01ca68d3757ba218e37f982ef76d09ebf
SHA2566387fb65c79f680dd09397ad45b4d9fc54e6c09ae8aea107c3d9425716eb7fba
SHA512fbbb6086022fccaa144190b750b3188fd943c6b000961eed72b9dce25b06ac8dbd7828e969ecbf9852fe5bbf68ffda80069dc4742c2abe188807986dfe96d6c1
-
Filesize
1.1MB
MD51d27bd571049766515c6475c2ca57fb4
SHA1830b8cf6ab988cc1f965a9240fc1baf93186129b
SHA25615b01fe0740b07587b34c40b152e381dc29f5eedf4e7cb9b0307fda2177f87b0
SHA512abf0d6788940080d880116bf7f211e8b0140b3386fcd011b31a7e47378e1b43dc491eddd0291330b4039174b00031b09706b9d3012c339f78ed13fc9c16a507a
-
Filesize
1.9MB
MD5cb2fc4892530b25677483b972cccd2b6
SHA1ee981f7c87e3a4123fc1797194d39f2a82adf8e8
SHA256da434dfcb3b21fd5fd49eccf066013e9732d7ca9aba22eaf611b01f98c053a6a
SHA5128dbf73c9e1337b15acf6d9fc916221d25db161db812430d9a424a36743f6535a547625113aa42000211865548c1c7fee70a70703f2593e26471f9efd9966fe02
-
Filesize
1.3MB
MD57bab316954f445b2018f3bc00afd8fe0
SHA13a32272024261cbe0c1a091204bcf0248fb370d8
SHA2562524b087f03d3de46ae1350d9edf881af5c8c2f92bffa1ed709b72e86bdde1d8
SHA512b09ff12bc2bc00c5672b919221865113d285c5d4b586c798c9697f0d7fd358e897bd684eaf7b39a7cae091761598d0b1ced6d8dec37ccffa39881b27e3945953