Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 08:41

General

  • Target

    7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d.exe

  • Size

    830KB

  • MD5

    79c8cf16dce99a95ba30db49a81c33fa

  • SHA1

    e7ac6ed98d5207315136c1b4e40c25ddcfd4b114

  • SHA256

    7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d

  • SHA512

    eec0acb3ae314573ec3fd45444c13a0683cd8ac8bd2926aa886aba22b32f49150dd989e8aaeb4c049d8725a6b0eccdfc5e309e8801f704c139e84e4287df4d34

  • SSDEEP

    12288:eMrLy90ne1BEOlsRuK5Ia0HVKixmDy8lu9PTJDiFQg9U56EXGnvs9lE8h7gXDr8F:pyXHHsnoHwi4w1DiH9U5zWvIVvUvWLD

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d.exe
    "C:\Users\Admin\AppData\Local\Temp\7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2Zf7290.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2Zf7290.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:2128
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:2896
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:4152
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3BM75kd.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3BM75kd.exe
            2⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3716
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
              3⤵
              • Creates scheduled task(s)
              PID:1980
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
              3⤵
              • Creates scheduled task(s)
              PID:1988

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2Zf7290.exe

          Filesize

          493KB

          MD5

          dd7109fb113cebb2db00415faad9a5c6

          SHA1

          c0f1cd9a1556501c25b87d07673a01179499269d

          SHA256

          b763e229d112d4606e436212cdf3ef6e4cb18b97b355bec81a5081e3a5e5cba1

          SHA512

          63a1fea9d01024281254a6958b22cb88f11b8b23e8de90e33e5be757ca717847238ef9ddf3f44759d18f4a349a6573968a897413cf3e58dd99bb5e25c2572449

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3BM75kd.exe

          Filesize

          1.3MB

          MD5

          70192e609418401e9528428856ae3b34

          SHA1

          ec27159b229fab96d57fe4693a79b7b88f9f5404

          SHA256

          f0e860c527c5e3fd50279f63c3b97be9bee5fdd5a3d461069d1b9a469e7090c3

          SHA512

          874b2009a8609e31e0997a165f2ac5455962909bbda082c47f9dec4cb9d5189fe67f1f537d4cfa17b35980bd7d5390e91da594b746e6f0ad7e3b7896578f13a1

        • memory/4152-7-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/4152-17-0x0000000007540000-0x0000000007AE4000-memory.dmp

          Filesize

          5.6MB

        • memory/4152-18-0x0000000006F90000-0x0000000007022000-memory.dmp

          Filesize

          584KB

        • memory/4152-20-0x0000000000F80000-0x0000000000F8A000-memory.dmp

          Filesize

          40KB

        • memory/4152-21-0x0000000008110000-0x0000000008728000-memory.dmp

          Filesize

          6.1MB

        • memory/4152-22-0x00000000072F0000-0x00000000073FA000-memory.dmp

          Filesize

          1.0MB

        • memory/4152-23-0x0000000007120000-0x0000000007132000-memory.dmp

          Filesize

          72KB

        • memory/4152-24-0x0000000007180000-0x00000000071BC000-memory.dmp

          Filesize

          240KB

        • memory/4152-25-0x00000000071E0000-0x000000000722C000-memory.dmp

          Filesize

          304KB