Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:02

General

  • Target

    446a34b8c4e3ca30c5f6c10a03580a59127ae30d85ec80832cfadf9d862cd1be.exe

  • Size

    1.0MB

  • MD5

    c51058281df6130d5aca94b364a37ff9

  • SHA1

    5e6c0434b0813d9607a6dad81d8b091f90865593

  • SHA256

    446a34b8c4e3ca30c5f6c10a03580a59127ae30d85ec80832cfadf9d862cd1be

  • SHA512

    c49ef6acb8f3f0e371a422b87a126354283983843ee42cb06c9821be55e6bd4b023db0ee33ee4cee393770e913ed24319401df5176cb2cb3e102c53ec6f9ad87

  • SSDEEP

    24576:1yZR0bDq7NVaZfI4VPfiwotOVN0WwGUo8ggaf47wETK:Qcq7b9qP3VL//5w7wET

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\446a34b8c4e3ca30c5f6c10a03580a59127ae30d85ec80832cfadf9d862cd1be.exe
    "C:\Users\Admin\AppData\Local\Temp\446a34b8c4e3ca30c5f6c10a03580a59127ae30d85ec80832cfadf9d862cd1be.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fN8TZ42.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fN8TZ42.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2uz4234.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2uz4234.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1392
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:4224
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:5068
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 152
              4⤵
              • Program crash
              PID:1576
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3fp16oI.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3fp16oI.exe
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4244
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
              4⤵
              • Creates scheduled task(s)
              PID:4500
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
              4⤵
              • Creates scheduled task(s)
              PID:4080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1392 -ip 1392
        1⤵
          PID:2544

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Execution

        Scheduled Task/Job

        1
        T1053

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Scheduled Task/Job

        1
        T1053

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Scheduled Task/Job

        1
        T1053

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fN8TZ42.exe
          Filesize

          945KB

          MD5

          ef9bd93043ce3bfbcca8163727ff0464

          SHA1

          ba9eadddd82fcc2c8aef784c1f10bfb31c588b08

          SHA256

          11c6baafddb56e4cb5da02215a0b9b4b35298d7d6aea0265516f9b5d024e94f3

          SHA512

          0bd57db17ee170a674487403302c883b7e82be0b72fa63df8d892eff1be746efc29f3ee7b05e11107053ae3ead98fd43805911cfd6890f0d979440844da9f3b8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2uz4234.exe
          Filesize

          1.1MB

          MD5

          23374572d1f265004bc00e752af88829

          SHA1

          07de950d87e5057cc6646983bfe9c0c456fcdca4

          SHA256

          07b525d29776766f392dee13b5cda0f54218e3cc8062949b78147377f0b17826

          SHA512

          e9b29aaaf1304a49dc77ca6e1929faf455ffa6c2cdde4c51446fb497ce1637c5493fbf5e4f0b37c8a9683031021022287fd5da312e4820605c0780e76f1da576

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3fp16oI.exe
          Filesize

          1.3MB

          MD5

          f3e286aa2a0dc5b8db2f38cd14713a0c

          SHA1

          d208409edba2e2ae313ece237a99b6d82d2630ca

          SHA256

          65aadb41c6e52a835408630d6d0408a505c6c32219eb6b7b594aff9563431135

          SHA512

          4c4b015d61291eb6ced46fef38a8f5c1e65ab35d805d70f34a0b0e4ff614069775db2d8338c1730e9cae66a9f9c3fc8f8932dc9220757e178084935cd571f6f7

        • memory/5068-18-0x0000000002E10000-0x0000000002E1A000-memory.dmp
          Filesize

          40KB

        • memory/5068-16-0x0000000007D40000-0x00000000082E4000-memory.dmp
          Filesize

          5.6MB

        • memory/5068-17-0x0000000007870000-0x0000000007902000-memory.dmp
          Filesize

          584KB

        • memory/5068-15-0x00000000743FE000-0x00000000743FF000-memory.dmp
          Filesize

          4KB

        • memory/5068-14-0x0000000000400000-0x000000000043C000-memory.dmp
          Filesize

          240KB

        • memory/5068-24-0x0000000008910000-0x0000000008F28000-memory.dmp
          Filesize

          6.1MB

        • memory/5068-29-0x0000000007C00000-0x0000000007D0A000-memory.dmp
          Filesize

          1.0MB

        • memory/5068-30-0x0000000007A40000-0x0000000007A52000-memory.dmp
          Filesize

          72KB

        • memory/5068-31-0x0000000007AA0000-0x0000000007ADC000-memory.dmp
          Filesize

          240KB

        • memory/5068-32-0x0000000007AE0000-0x0000000007B2C000-memory.dmp
          Filesize

          304KB

        • memory/5068-34-0x00000000743FE000-0x00000000743FF000-memory.dmp
          Filesize

          4KB