Overview
overview
10Static
static
3016b8fab11...90.exe
windows10-2004-x64
10046f35763e...68.exe
windows10-2004-x64
1014e25178ee...de.exe
windows10-2004-x64
1058609bf38b...1d.exe
windows10-2004-x64
105e46be5a16...b4.exe
windows10-2004-x64
1064220efa05...b0.exe
windows10-2004-x64
107252b3ba90...cd.exe
windows10-2004-x64
10761baf17cd...b8.exe
windows10-2004-x64
1079b34442d1...59.exe
windows10-2004-x64
107bca30b01b...44.exe
windows10-2004-x64
77f2d656f1a...24.exe
windows10-2004-x64
1092903f5aac...33.exe
windows10-2004-x64
10a6fd8428c6...ff.exe
windows10-2004-x64
10a9a24c6b40...79.exe
windows10-2004-x64
10c957c1f7d6...20.exe
windows10-2004-x64
10d30a3fe09c...90.exe
windows10-2004-x64
10d4c8c5a1d2...4e.exe
windows10-2004-x64
10e2ca05276c...37.exe
windows10-2004-x64
10e79c48869d...9a.exe
windows10-2004-x64
10fff53a878c...d6.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
016b8fab114770bc330d8c49bc8909920899011e9018ceeaa5233b1b572c4190.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
14e25178ee8b8712bc968c820fb869e90a44dec170ecd8a6483ae8f108b1f2de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
5e46be5a1605d21562eda70cd21e2675e650c3789e8dde9dfb908ec546adc9b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
64220efa0582fe1aec27096123429aeb58dc263d43340ad6613555ad427544b0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
79b34442d1c8507ff7bb7f184e63b7b674da3847ab0d3d8203b60c93467fa859.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7bca30b01b52faa483cb9bba6adca25589109b55d6cd6c01bb4219ef6d8f4444.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
a6fd8428c609450c9b2629eda53c7749e0bb145c64d6bcfc5071adec21c467ff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
a9a24c6b40b53ea0f85263a4222bf4792c43b7f26287058d9cd536b2ceb5a779.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
c957c1f7d6e812384412b37342974d2234a9d5e5aaa2e53f0e6e41977b4af020.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e2ca05276c37a88d337993eae49ec4ac99bf1c9f9e56112366021c7a649bf337.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe
Resource
win10v2004-20240426-en
General
-
Target
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe
-
Size
1.1MB
-
MD5
f9ea3474dbb9042c2d93391723e11290
-
SHA1
089f3964fbea1af9ca2cc7e6fbc3f650c492d026
-
SHA256
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68
-
SHA512
9732f9bf8b8b4f1900c0b3b87e3253dc45ca79f1cb14e301c06c2fab42e74c31761b8b0650d431190f4110de7c44f6690ccc5c148848ab4e334908c0050cbfaa
-
SSDEEP
24576:tyuCIG0kTDLHjOo/4CJY9rtBg5/ZbLKGF0tUEqTXinYxJM6/K1by18oRt:IEYDLDO4Y9RBg1ZbLluqTXinuCF2
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1108-21-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Drops startup file 1 IoCs
Processes:
3Zn63lL.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 3Zn63lL.exe -
Executes dropped EXE 4 IoCs
Processes:
TX5la26.exeue2vq20.exe2rJ5149.exe3Zn63lL.exepid process 5036 TX5la26.exe 3164 ue2vq20.exe 4852 2rJ5149.exe 5056 3Zn63lL.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exeTX5la26.exeue2vq20.exe3Zn63lL.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" TX5la26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ue2vq20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 3Zn63lL.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2rJ5149.exedescription pid process target process PID 4852 set thread context of 1108 4852 2rJ5149.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4092 schtasks.exe 1132 schtasks.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exeTX5la26.exeue2vq20.exe2rJ5149.exe3Zn63lL.exedescription pid process target process PID 3212 wrote to memory of 5036 3212 046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe TX5la26.exe PID 3212 wrote to memory of 5036 3212 046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe TX5la26.exe PID 3212 wrote to memory of 5036 3212 046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe TX5la26.exe PID 5036 wrote to memory of 3164 5036 TX5la26.exe ue2vq20.exe PID 5036 wrote to memory of 3164 5036 TX5la26.exe ue2vq20.exe PID 5036 wrote to memory of 3164 5036 TX5la26.exe ue2vq20.exe PID 3164 wrote to memory of 4852 3164 ue2vq20.exe 2rJ5149.exe PID 3164 wrote to memory of 4852 3164 ue2vq20.exe 2rJ5149.exe PID 3164 wrote to memory of 4852 3164 ue2vq20.exe 2rJ5149.exe PID 4852 wrote to memory of 1856 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 1856 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 1856 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 5064 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 5064 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 5064 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 1108 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 1108 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 1108 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 1108 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 1108 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 1108 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 1108 4852 2rJ5149.exe AppLaunch.exe PID 4852 wrote to memory of 1108 4852 2rJ5149.exe AppLaunch.exe PID 3164 wrote to memory of 5056 3164 ue2vq20.exe 3Zn63lL.exe PID 3164 wrote to memory of 5056 3164 ue2vq20.exe 3Zn63lL.exe PID 3164 wrote to memory of 5056 3164 ue2vq20.exe 3Zn63lL.exe PID 5056 wrote to memory of 4092 5056 3Zn63lL.exe schtasks.exe PID 5056 wrote to memory of 4092 5056 3Zn63lL.exe schtasks.exe PID 5056 wrote to memory of 4092 5056 3Zn63lL.exe schtasks.exe PID 5056 wrote to memory of 1132 5056 3Zn63lL.exe schtasks.exe PID 5056 wrote to memory of 1132 5056 3Zn63lL.exe schtasks.exe PID 5056 wrote to memory of 1132 5056 3Zn63lL.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe"C:\Users\Admin\AppData\Local\Temp\046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TX5la26.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TX5la26.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ue2vq20.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ue2vq20.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2rJ5149.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2rJ5149.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1856
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:5064
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Zn63lL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Zn63lL.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:4092 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
952KB
MD533af80a3e1c3413bd0d34ff72c80d18d
SHA1d06630e0e69f9388e5eb570ed16c2d7001b6485b
SHA25688d1192de35aede8ce26d9ef820d6f683e99e46e267b45bcf8b5c3426c67b252
SHA5124581413cca8569f620771c7a8615e20766d2e70b379ed4a0ef2483c7de14d7609309240abea941c9699053857406dcffc17167499ec99939d0dee7b823353984
-
Filesize
828KB
MD5cea3e82efec513414343d5b9a361bb4f
SHA13619e7ae90bdb2bff94505fbb7bf932a0fa8f593
SHA25659a79e3b23f7a4ca2d26b02774b7caa31e4e11dcd986aa730a410a63952da2ae
SHA512eccb99c2f19a6e4dc4693c274ff6c7108e15d3b863a0589078895414b254ba59721fe926a0b8320d0752fb073afc3944a61d0c59e7540ea6ab9c6a05a15c4341
-
Filesize
493KB
MD5e73f9dd90baefe8557834de0dabcfed9
SHA126096038f8720544035e7c31e80fa63bc1cfc050
SHA256d66ba28b6d94e000fe91b4a034c0419af0c0685ab9f5f81564537c0298505886
SHA512ef682157920cebd3ad2828faa37625b7296c9b131567a76b0d8dbd2b4e93f2727c8f26139013fc7b5a4718d6420aea4ead5cc7edaf6a9409377adf2e7de482ec
-
Filesize
1.3MB
MD51a7eaa0085de6f8d539fc37bcb941e11
SHA14a116723a40c10bd6e23a799e99747cf12c51a74
SHA256727a84ba5e42b7da59f87fde25d640839b75f36f863473931c9d66db5384dc2b
SHA5125693ad5220f6b84c828a9acf2c247309100c04ac7ecc08b0f9931884891b6c82f2df855cd6f4262041b1e983213853a6996a8e99fbcc2faf5d028823c0dd05e9