Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 11:20

General

  • Target

    24941336d0128a7ae974066981d3a1f75cc9af91a69a49b292688943f69afa72.exe

  • Size

    1.0MB

  • MD5

    bb9900689940b2154b9b395fce9ad47b

  • SHA1

    79d1ae33512de00466f9d94ad218c14db69aaea8

  • SHA256

    24941336d0128a7ae974066981d3a1f75cc9af91a69a49b292688943f69afa72

  • SHA512

    c1dd079b33cb55034d77baf46a34710ad737c5c59796b2394c252749e937e1039e5a82f79afd805d019f29647b726bb46a295231bd6142f5cfb24facd625e52b

  • SSDEEP

    24576:9yeBW5OU02BlbIchjvrU//0Zsfi0EJ3uiS2sTRqJ:YeBbCscBw/4sq0EJ3uiSh

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24941336d0128a7ae974066981d3a1f75cc9af91a69a49b292688943f69afa72.exe
    "C:\Users\Admin\AppData\Local\Temp\24941336d0128a7ae974066981d3a1f75cc9af91a69a49b292688943f69afa72.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lg7ZG36.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lg7ZG36.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2wr4396.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2wr4396.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4160
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:4204
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 608
            4⤵
            • Program crash
            PID:4880
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3CS72ZM.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3CS72ZM.exe
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2168
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
            4⤵
            • Creates scheduled task(s)
            PID:852
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
            4⤵
            • Creates scheduled task(s)
            PID:4792
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4160 -ip 4160
      1⤵
        PID:3816

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Scheduled Task/Job

      1
      T1053

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lg7ZG36.exe
        Filesize

        946KB

        MD5

        2f80a3817d65da42552ca4d7db386db5

        SHA1

        b7ff62989657b516e5c52ad1f18b6a9b6b02fdb9

        SHA256

        8f103d5247e82660bb6ad9ab45340d9f0d6d8fed00c91a125bc4ef821bb5fb33

        SHA512

        5bb727abc7cfe2f17a3b50a5cdeef4e015387bc0b9644a111e82372c20df31488ba642a26a72d92dc9bfa7341aa5b0c4759990f91a93a7b2cb27bde6b5883371

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2wr4396.exe
        Filesize

        1.1MB

        MD5

        415169dea1139c7e1f96569943069903

        SHA1

        6e1a274027bd86c4432ecfc208615e7498554238

        SHA256

        c2b314d138c73567b5453dd8be36ee4779038194e78a36c1132ff33702fd3030

        SHA512

        58d34e1dda8549a6237a34f38d40d6c6a063df71753808cab5e46f22c3e57804bada803a1581a48cd58a67e481673a29a324cf140d6c49480aa55b2a90640d12

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3CS72ZM.exe
        Filesize

        1.3MB

        MD5

        3cd8afe091792c9525a30ed550d07b87

        SHA1

        5544126947f3dc0a84f1c4d455a0e2233127061e

        SHA256

        cbca02157ee67eab849304db2469e7fb0106260a64246488cb9bc498ac8213a2

        SHA512

        4e5f5f7f5765f963fb4fbf8ba34b975dde444b08ba5e717b9a72e185648ac323c019c1c8dfb217fd2954cc24906a9a7b9a61ec3609ceabe4be07442c166b48e1

      • memory/4204-18-0x0000000004A70000-0x0000000004A7A000-memory.dmp
        Filesize

        40KB

      • memory/4204-16-0x00000000079B0000-0x0000000007F54000-memory.dmp
        Filesize

        5.6MB

      • memory/4204-17-0x00000000074B0000-0x0000000007542000-memory.dmp
        Filesize

        584KB

      • memory/4204-15-0x0000000073F6E000-0x0000000073F6F000-memory.dmp
        Filesize

        4KB

      • memory/4204-14-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB

      • memory/4204-24-0x0000000008580000-0x0000000008B98000-memory.dmp
        Filesize

        6.1MB

      • memory/4204-25-0x0000000007880000-0x000000000798A000-memory.dmp
        Filesize

        1.0MB

      • memory/4204-26-0x00000000075A0000-0x00000000075B2000-memory.dmp
        Filesize

        72KB

      • memory/4204-27-0x0000000007770000-0x00000000077AC000-memory.dmp
        Filesize

        240KB

      • memory/4204-32-0x0000000007600000-0x000000000764C000-memory.dmp
        Filesize

        304KB

      • memory/4204-34-0x0000000073F6E000-0x0000000073F6F000-memory.dmp
        Filesize

        4KB