Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 05:33

General

  • Target

    a4215d26b6f0c0e1bf7e0f7a14e39744684399db4b301d328c8f7df9ca1c0b74.exe

  • Size

    954KB

  • MD5

    2007fd745de85725bd3c50bc100af3dc

  • SHA1

    be0942dfed4466f4181936016cc020ed72918fb6

  • SHA256

    a4215d26b6f0c0e1bf7e0f7a14e39744684399db4b301d328c8f7df9ca1c0b74

  • SHA512

    ca2e84396e623838f7900a2c73f28d5a5675c179a462878232c618234c7f68f1f3e4eb6003f9c9fdacc0bcb7849d2385e63422aa640d6fe3244db49481cc9973

  • SSDEEP

    24576:Ky0CNEQDcgkWfaKBfZh59btIafN7V9joSiS5nYI:RSqjflZttIaV7V9ESR1

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4215d26b6f0c0e1bf7e0f7a14e39744684399db4b301d328c8f7df9ca1c0b74.exe
    "C:\Users\Admin\AppData\Local\Temp\a4215d26b6f0c0e1bf7e0f7a14e39744684399db4b301d328c8f7df9ca1c0b74.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sp4ZI53.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sp4ZI53.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2VQ2365.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2VQ2365.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3152
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:4092
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3PV31YF.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3PV31YF.exe
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1420
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
            4⤵
            • Creates scheduled task(s)
            PID:2348
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
            4⤵
            • Creates scheduled task(s)
            PID:2264

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sp4ZI53.exe

      Filesize

      830KB

      MD5

      58d5924c8c0acef45b18bf42a994da8b

      SHA1

      bba62e10bf6adae3505d3b763a7b813d9a667716

      SHA256

      8537fc97d931d0e62896e54756e1cdd774b1b68e20fd7281a207198467c01e4a

      SHA512

      2ae7e900f50253e72f8bcd190ad7c106fbae4cc18d23607ffb4dd05115409ebf3faca2a5f433ada5431145457f396d1f254017a6aab22052ccd29d36cbf8d92d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2VQ2365.exe

      Filesize

      493KB

      MD5

      7d79538bfe9cdb9fe4e443d8bf18a9c7

      SHA1

      2a61a55ad50a0d72a5b3d46ea67635dc1baf1c6f

      SHA256

      56b84e843fbce4f42e562ecc2b617e416847a61fa63c9f6a4263a9af04e457a5

      SHA512

      9fe34f033c306188a7c3ffe8b3e549722ac09ae31de7ecfe37e9ca24713e07450980821d9bd0136a450b201fa77d9238885dfa1841b940c05ef6f7e8770992a1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3PV31YF.exe

      Filesize

      1.3MB

      MD5

      a1e76c4ab37080c7e7c2e14b7e865c58

      SHA1

      d19418b430208cc0a92b3992c0ed7a3840aae9c9

      SHA256

      fb22f95db8d25b023d81ffcd63ea4b9f0f0d3041a0c8007f9be6dd87e564598b

      SHA512

      a8587ba394a212902364ef3ff10354f8cc4397f1066a46481518b4be9c8de5f363d763bbe12c7771037599c8b68923ea8a18d1693054d884e7fe2d0796271609

    • memory/4092-14-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4092-24-0x0000000007A50000-0x0000000007FF4000-memory.dmp

      Filesize

      5.6MB

    • memory/4092-25-0x0000000007540000-0x00000000075D2000-memory.dmp

      Filesize

      584KB

    • memory/4092-27-0x0000000004AC0000-0x0000000004ACA000-memory.dmp

      Filesize

      40KB

    • memory/4092-29-0x00000000078A0000-0x00000000079AA000-memory.dmp

      Filesize

      1.0MB

    • memory/4092-28-0x0000000008620000-0x0000000008C38000-memory.dmp

      Filesize

      6.1MB

    • memory/4092-30-0x0000000007660000-0x0000000007672000-memory.dmp

      Filesize

      72KB

    • memory/4092-31-0x00000000077D0000-0x000000000780C000-memory.dmp

      Filesize

      240KB

    • memory/4092-32-0x0000000007810000-0x000000000785C000-memory.dmp

      Filesize

      304KB