Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:56

General

  • Target

    18b5f5ec443576ad4102d53a0366fc22c8cffc5e42177408ed6e4752ad377905.exe

  • Size

    829KB

  • MD5

    b4d249a2e9975c57a66c06eb596c0617

  • SHA1

    567fbed16a3f02fb43c91df049b01fb81a4b4a43

  • SHA256

    18b5f5ec443576ad4102d53a0366fc22c8cffc5e42177408ed6e4752ad377905

  • SHA512

    dcf2374970097d87eb460d6c146299240b9985fd3529df776643639b807bd390256ce88a47f771148f565ba89c86820ec0428f70f067aaca7984f706a110d821

  • SSDEEP

    24576:ryz3vIQ49axlLm2n8gYaetlEhQNemoNBn:ebvIQe2NYB2mm

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18b5f5ec443576ad4102d53a0366fc22c8cffc5e42177408ed6e4752ad377905.exe
    "C:\Users\Admin\AppData\Local\Temp\18b5f5ec443576ad4102d53a0366fc22c8cffc5e42177408ed6e4752ad377905.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2kY4194.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2kY4194.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:1432
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3ia17Co.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3ia17Co.exe
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2792
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
          3⤵
          • Creates scheduled task(s)
          PID:4504
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
          3⤵
          • Creates scheduled task(s)
          PID:1452

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2kY4194.exe

      Filesize

      493KB

      MD5

      26cfdf61c3bde5dce9048c7b6262e592

      SHA1

      2a33baeea87dcd078ed039ccb536ee8ab693552e

      SHA256

      c4f73cf2ba9594a645373b70b36e0b544fad5f9b1c1f206dbea92bb0f962025c

      SHA512

      ddbc41ac398d42993fb2c6ebd3bd9b3cf93fe18082f70db10646a4f6cae2c61f6f097d2cff0f4702ae2efb7313eb83a610ef32e3b2aa5183bc9de94f7bd6e724

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3ia17Co.exe

      Filesize

      1.3MB

      MD5

      8b53f841a7c85ef72158da5f8a6b89f7

      SHA1

      36adf16da721c964ad403ea6ac39a63750710203

      SHA256

      fb9e780b5b5e75744ddeba6c7e5e048fb8af2dcf4b2bd528498cb25633cc2f1b

      SHA512

      ac4d362058a6d8bcf87f015680dcc73732e598407db8ee9e513ed0ffa208cfd4f00044861ec0aef5e5716deca11fd6d66f595db3dac792cd8c8ded96564a5058

    • memory/1432-21-0x0000000004A90000-0x0000000004A9A000-memory.dmp

      Filesize

      40KB

    • memory/1432-11-0x0000000073BFE000-0x0000000073BFF000-memory.dmp

      Filesize

      4KB

    • memory/1432-18-0x0000000007930000-0x0000000007ED4000-memory.dmp

      Filesize

      5.6MB

    • memory/1432-19-0x0000000007460000-0x00000000074F2000-memory.dmp

      Filesize

      584KB

    • memory/1432-7-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1432-22-0x0000000008500000-0x0000000008B18000-memory.dmp

      Filesize

      6.1MB

    • memory/1432-23-0x0000000007810000-0x000000000791A000-memory.dmp

      Filesize

      1.0MB

    • memory/1432-24-0x0000000007650000-0x0000000007662000-memory.dmp

      Filesize

      72KB

    • memory/1432-25-0x00000000076B0000-0x00000000076EC000-memory.dmp

      Filesize

      240KB

    • memory/1432-26-0x0000000007700000-0x000000000774C000-memory.dmp

      Filesize

      304KB

    • memory/1432-27-0x0000000073BFE000-0x0000000073BFF000-memory.dmp

      Filesize

      4KB