Overview
overview
10Static
static
304a0e65087...2d.exe
windows10-2004-x64
100b23052e1d...05.exe
windows10-2004-x64
101319d83702...15.exe
windows10-2004-x64
1015bb5ac797...dd.exe
windows10-2004-x64
1019eb5c3dd8...ec.exe
windows10-2004-x64
102864919e9f...b7.exe
windows10-2004-x64
102f05412e59...2c.exe
windows10-2004-x64
103fd9e44b8d...84.exe
windows10-2004-x64
104920924329...b6.exe
windows10-2004-x64
106d6ab7a20c...33.exe
windows10-2004-x64
106e839edc16...b0.exe
windows10-2004-x64
106ff00efb56...f0.exe
windows10-2004-x64
107018985aa0...8e.exe
windows10-2004-x64
107b28b5b2ff...4e.exe
windows10-2004-x64
1093bee57b71...41.exe
windows10-2004-x64
10a22d19b8f1...9a.exe
windows10-2004-x64
10af3432152c...8d.exe
windows10-2004-x64
10bf27d39d4b...d1.exe
windows10-2004-x64
10db87d25edb...b5.exe
windows10-2004-x64
10f935568ec0...6c.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1319d8370208b00e5260cfc0b8f145575c62bd43ab6f76605a992afeb6737f15.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
15bb5ac797303fa462001ce5fd88a7bfc4702cd65f0a1768f9b994f6495a49dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
19eb5c3dd82e78329d1d98ef6b119402fff11484aea9cfea0e3e1135eea669ec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2864919e9fd253aa62ab37d5b02410fa89dd3ead4618da0b908d3b41e73167b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4920924329af964d29e90b0bd3763c20450919411ad6b6ddabfd88061a7555b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
6ff00efb56e1358cc67995d20e4e1edfffeb0789812a5cd830e2f477e16f63f0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7018985aa093121c146c37bf15499c6914c370d8b1e61fe98047260a3f0f5d8e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7b28b5b2ffa7298e1bc65ee1f5e49125dd2ae16da86952d43e4d1ac1e04c6e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
93bee57b7167fba61070c22f0c719ebb27499c5ff106633260f340e4917cf741.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a22d19b8f183bcd64a7c85a1e82f19e6db501a7e19b93ebc313864c2a0e6ce9a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f935568ec008833a6b510aaa18da8f703b0263d31ec0ee4a4442facb817a946c.exe
Resource
win10v2004-20240226-en
General
-
Target
04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe
-
Size
1.1MB
-
MD5
220a3457bac0b7e002558e635cc38c53
-
SHA1
c7de62cda431e4166e2a4f77b0522f5195caf86c
-
SHA256
04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d
-
SHA512
f627940e941ce4b632dcea6a7ffa85cc5727e0937550f1c8543438e9ceedd529a9d0dbf9501a311b1db9ed60880a298c8cdffdde14b1705488220b97bbe714fb
-
SSDEEP
24576:cyiWn8NR7Ih++UoI4yYGhmAkkW+rc29OeK+:LiWnyReuYGhmr+f9TK
Malware Config
Extracted
risepro
194.49.94.152
Extracted
redline
horda
194.49.94.152:19053
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2100-34-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 3192 Ax7hw73.exe 2864 1GU36Hg3.exe 2056 2Lw6913.exe 5116 3RY29ZY.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ax7hw73.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" AppLaunch.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini AppLaunch.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol AppLaunch.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI AppLaunch.exe File opened for modification C:\Windows\System32\GroupPolicy AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2864 set thread context of 5052 2864 1GU36Hg3.exe 86 PID 2056 set thread context of 2100 2056 2Lw6913.exe 95 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3RY29ZY.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3RY29ZY.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3RY29ZY.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3540 schtasks.exe 3464 schtasks.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3824 wrote to memory of 3192 3824 04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe 83 PID 3824 wrote to memory of 3192 3824 04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe 83 PID 3824 wrote to memory of 3192 3824 04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe 83 PID 3192 wrote to memory of 2864 3192 Ax7hw73.exe 84 PID 3192 wrote to memory of 2864 3192 Ax7hw73.exe 84 PID 3192 wrote to memory of 2864 3192 Ax7hw73.exe 84 PID 2864 wrote to memory of 5052 2864 1GU36Hg3.exe 86 PID 2864 wrote to memory of 5052 2864 1GU36Hg3.exe 86 PID 2864 wrote to memory of 5052 2864 1GU36Hg3.exe 86 PID 2864 wrote to memory of 5052 2864 1GU36Hg3.exe 86 PID 2864 wrote to memory of 5052 2864 1GU36Hg3.exe 86 PID 2864 wrote to memory of 5052 2864 1GU36Hg3.exe 86 PID 2864 wrote to memory of 5052 2864 1GU36Hg3.exe 86 PID 2864 wrote to memory of 5052 2864 1GU36Hg3.exe 86 PID 2864 wrote to memory of 5052 2864 1GU36Hg3.exe 86 PID 2864 wrote to memory of 5052 2864 1GU36Hg3.exe 86 PID 3192 wrote to memory of 2056 3192 Ax7hw73.exe 87 PID 3192 wrote to memory of 2056 3192 Ax7hw73.exe 87 PID 3192 wrote to memory of 2056 3192 Ax7hw73.exe 87 PID 5052 wrote to memory of 3464 5052 AppLaunch.exe 89 PID 5052 wrote to memory of 3464 5052 AppLaunch.exe 89 PID 5052 wrote to memory of 3464 5052 AppLaunch.exe 89 PID 2056 wrote to memory of 4544 2056 2Lw6913.exe 90 PID 2056 wrote to memory of 4544 2056 2Lw6913.exe 90 PID 2056 wrote to memory of 4544 2056 2Lw6913.exe 90 PID 2056 wrote to memory of 1752 2056 2Lw6913.exe 93 PID 2056 wrote to memory of 1752 2056 2Lw6913.exe 93 PID 2056 wrote to memory of 1752 2056 2Lw6913.exe 93 PID 2056 wrote to memory of 2100 2056 2Lw6913.exe 95 PID 2056 wrote to memory of 2100 2056 2Lw6913.exe 95 PID 2056 wrote to memory of 2100 2056 2Lw6913.exe 95 PID 2056 wrote to memory of 2100 2056 2Lw6913.exe 95 PID 2056 wrote to memory of 2100 2056 2Lw6913.exe 95 PID 2056 wrote to memory of 2100 2056 2Lw6913.exe 95 PID 2056 wrote to memory of 2100 2056 2Lw6913.exe 95 PID 2056 wrote to memory of 2100 2056 2Lw6913.exe 95 PID 3824 wrote to memory of 5116 3824 04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe 96 PID 3824 wrote to memory of 5116 3824 04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe 96 PID 3824 wrote to memory of 5116 3824 04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe 96 PID 5052 wrote to memory of 3540 5052 AppLaunch.exe 97 PID 5052 wrote to memory of 3540 5052 AppLaunch.exe 97 PID 5052 wrote to memory of 3540 5052 AppLaunch.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe"C:\Users\Admin\AppData\Local\Temp\04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ax7hw73.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ax7hw73.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1GU36Hg3.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1GU36Hg3.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:3464
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:3540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Lw6913.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Lw6913.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3RY29ZY.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3RY29ZY.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:5116
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2244
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
38KB
MD56de74d790957732ad4286b37c916ecc8
SHA17513d0d61c3cf465438f0da835587619b764e7ad
SHA256bf7e28a91285d2d8780a1e9500b169990567eed902869a54272ed8929b9230b9
SHA5125ff127849a3ded3a18da2180adeb1d4ac3cbac3b601aa770fc5b3f5de3faa1d647347bbc554310c7e27fe8302185b1dbbbbd66eefa381174e5f75b0373922990
-
Filesize
966KB
MD5197dc6ea355ffa77ad6f35918358167e
SHA1e043a2e94c3f44352cce0c3c81804c2403656673
SHA2564cf63499559d37753345b8f185b58a946b50bcd57378e617044f01ca32562102
SHA51213097546c4a36b9d37983927006537dda3a6250201fd71f1e27a88c61fe4707316341c2f144f4fcef844a7aead2199078900aa542632865987842a093a00f856
-
Filesize
1.6MB
MD59fdec9669237bf48150127ac4b38d665
SHA142ac8a807ae7f427fbcf888fba34e153da9e8939
SHA25622fd7fda451c56372d0c27e29a89777791e618541d34350d65780504c91addc4
SHA5122041823d562e1c5ab79b2919f17a7170d8972ade936ff919c57429072120f87e6feff1f0ef9031d04f0b0601edcd0065616be1e71481be47a708915f43fbfa50
-
Filesize
401KB
MD526a76bfd58645c9ba017a3eede906221
SHA10f8ff57f441d1341e46c6d1ce9f542ff17654ffd
SHA256a0bb30459799df7b8091572eb5b33a63580af63b8e01318425e722da0f52ec96
SHA5125e49155061313a3e3a32f7d98ac222045e0d8a262a504d99b25230a9c28c4a2f6cf2da812d6fe24136b187d7967c6ba9dc7ce53322620221bc918fe513474626