Overview
overview
10Static
static
30697314d1d...a5.exe
windows10-2004-x64
100f998493b8...79.exe
windows10-2004-x64
1021e1937094...38.exe
windows10-2004-x64
102800d64eb3...31.exe
windows10-2004-x64
103d64fae31a...d7.exe
windows10-2004-x64
10652a4e2d36...35.exe
windows10-2004-x64
106b4d258a8d...1a.exe
windows10-2004-x64
1074c99e0dfd...42.exe
windows10-2004-x64
107e6bab9491...d0.exe
windows10-2004-x64
80af2b3540...7e.exe
windows10-2004-x64
10a96b277202...ca.exe
windows10-2004-x64
10c1237a6a46...5b.exe
windows10-2004-x64
7d7fde0f5ef...97.exe
windows10-2004-x64
10dc220ed080...4e.exe
windows10-2004-x64
10e5e7bb0a7c...4a.exe
windows10-2004-x64
10e91c8d8104...e0.exe
windows10-2004-x64
10f3b6442113...3b.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
0697314d1d15813c538133353196a25ddf09e9340585e2de0be061757a02bea5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0f998493b83f94488301c2a7f85ec4ad445820110ece601aee7e9d15a5ae5179.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
21e19370941ed45f65950d345652c8fe76f4f409b0bbb8261c579fb219042338.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
2800d64eb3bc5b7c1f807e9baaf76c469f1d63f07cc116fb310c5c866087d931.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
3d64fae31acb5d4e6e0319606608e94d2b3a017279c295dba43ce4d28aab53d7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
652a4e2d36de8360e61d407c228b3eb8948cafa60881c208bbd568afd7222f35.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
74c99e0dfdc0750268c34c3d63288e0bea52796a82c9b157a495fbe2608d4942.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80af2b3540716fa5dcd664b7f7ed120e1c1aa575c2fc1e1b6ee5df1723f2ab7e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
c1237a6a46458518390f044aae909d7b4e395ae64c6bb1db16e0cbe581f8d65b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
d7fde0f5efb7f555528ff1c98946e36088ec7396d07c4fd0a577c6b49c4bcd97.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
dc220ed080f58ca4a078f8ea2a3ba2d42611f3da8514d41359c39eae805b1c4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe
Resource
win10v2004-20240426-en
General
-
Target
a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe
-
Size
935KB
-
MD5
7c48d0260b3561c0bd83681d4e14b2cc
-
SHA1
d710c30efc2b38a57fe06894ec82d9dc2985c9cd
-
SHA256
a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca
-
SHA512
c7898ff1ff23a2bd3e7f684c83ffd836e0508f25046796ff2a4b2fb86283d5f1ef21d00ce20a38f122e613f8361fc74edfd9c930067a32a145b19fb8c445408c
-
SSDEEP
24576:2yNYzfCr0NMJxqAdlJflIp1jWnS8x3NtP2qA4h2iTTcOY3Jfzw:FNYzK4mJxqWjflIoS0/P2/4hFTTcJ
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral11/memory/1660-14-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Drops startup file 1 IoCs
Processes:
3Gj57Vw.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 3Gj57Vw.exe -
Executes dropped EXE 3 IoCs
Processes:
AE6QQ50.exe2Ow2103.exe3Gj57Vw.exepid process 5036 AE6QQ50.exe 4200 2Ow2103.exe 4516 3Gj57Vw.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exeAE6QQ50.exe3Gj57Vw.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" AE6QQ50.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 3Gj57Vw.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2Ow2103.exedescription pid process target process PID 4200 set thread context of 1660 4200 2Ow2103.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2128 4200 WerFault.exe 2Ow2103.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3132 schtasks.exe 2464 schtasks.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exeAE6QQ50.exe2Ow2103.exe3Gj57Vw.exedescription pid process target process PID 4368 wrote to memory of 5036 4368 a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe AE6QQ50.exe PID 4368 wrote to memory of 5036 4368 a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe AE6QQ50.exe PID 4368 wrote to memory of 5036 4368 a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe AE6QQ50.exe PID 5036 wrote to memory of 4200 5036 AE6QQ50.exe 2Ow2103.exe PID 5036 wrote to memory of 4200 5036 AE6QQ50.exe 2Ow2103.exe PID 5036 wrote to memory of 4200 5036 AE6QQ50.exe 2Ow2103.exe PID 4200 wrote to memory of 4308 4200 2Ow2103.exe AppLaunch.exe PID 4200 wrote to memory of 4308 4200 2Ow2103.exe AppLaunch.exe PID 4200 wrote to memory of 4308 4200 2Ow2103.exe AppLaunch.exe PID 4200 wrote to memory of 1660 4200 2Ow2103.exe AppLaunch.exe PID 4200 wrote to memory of 1660 4200 2Ow2103.exe AppLaunch.exe PID 4200 wrote to memory of 1660 4200 2Ow2103.exe AppLaunch.exe PID 4200 wrote to memory of 1660 4200 2Ow2103.exe AppLaunch.exe PID 4200 wrote to memory of 1660 4200 2Ow2103.exe AppLaunch.exe PID 4200 wrote to memory of 1660 4200 2Ow2103.exe AppLaunch.exe PID 4200 wrote to memory of 1660 4200 2Ow2103.exe AppLaunch.exe PID 4200 wrote to memory of 1660 4200 2Ow2103.exe AppLaunch.exe PID 5036 wrote to memory of 4516 5036 AE6QQ50.exe 3Gj57Vw.exe PID 5036 wrote to memory of 4516 5036 AE6QQ50.exe 3Gj57Vw.exe PID 5036 wrote to memory of 4516 5036 AE6QQ50.exe 3Gj57Vw.exe PID 4516 wrote to memory of 3132 4516 3Gj57Vw.exe schtasks.exe PID 4516 wrote to memory of 3132 4516 3Gj57Vw.exe schtasks.exe PID 4516 wrote to memory of 3132 4516 3Gj57Vw.exe schtasks.exe PID 4516 wrote to memory of 2464 4516 3Gj57Vw.exe schtasks.exe PID 4516 wrote to memory of 2464 4516 3Gj57Vw.exe schtasks.exe PID 4516 wrote to memory of 2464 4516 3Gj57Vw.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe"C:\Users\Admin\AppData\Local\Temp\a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AE6QQ50.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AE6QQ50.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Ow2103.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Ow2103.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6004⤵
- Program crash
PID:2128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Gj57Vw.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Gj57Vw.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:3132
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:2464
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4200 -ip 42001⤵PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
811KB
MD5119b6bbd00145c416e7ec0579be86c11
SHA1d6bec5b0f94cbfd031900b51760764d6e18f9539
SHA256568978a8d11ec7b1711228c72241b4ec04dc804e766994fcdb0f03a7aa1fff78
SHA51252d36b400e2b3941a5518ab6f4d0ec8a04e127292a6e8d8b2296656179df47103cdcd29ede41fc1722ce0cd65448b5ddbcbe9071954b8b9ad5658a7aab806e86
-
Filesize
432KB
MD58a9959c0a27445952560eae8210f26e5
SHA1791fbc8b52167e2b91af7f173cdc96a098388cbf
SHA256f6fb573372e7a095d78b8302dac1ddf8045b645f3d073e29e13a70328f2b72d2
SHA51268765f6e3b3d9cc966e574fb9e03a50dc53f5a37c52e28b70c9528d11943c5e598e7e91f69292e3f5d9460d004f3b770940d398fbb6fa1bffe694a0747b3d7cf
-
Filesize
1.3MB
MD5cce9b5273c9ca3e96e70ff065340eeee
SHA1995221fc587a19b4db17d305e25b6366395405fb
SHA25663fed47f3ad79ec65eb8b4e15212dc94025aa4e071ed50c54bccc3658ba1efad
SHA512d355a3d2f4156521c399a14fe21f8bacbfd13d8de29766dcb016dbc3918872753f660a9eeb692fa66c4cd891c5a855da50b4bf4235d4465a80eff4ac66404ca3