Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 11:20

General

  • Target

    26a2cda7a1e823b15014df6457ead29cc24ca1e9d7348e5f7ce65fac3e640998.exe

  • Size

    1.3MB

  • MD5

    86cbb67c990eec1b056fb82f113bebbf

  • SHA1

    dc1ffa43dc573d580c698f8a350f33fbb7704a93

  • SHA256

    26a2cda7a1e823b15014df6457ead29cc24ca1e9d7348e5f7ce65fac3e640998

  • SHA512

    9f0752b57f62dd6f397c24c92d9efa143e603e10347f6114fbf41cfdeed0906f88eef1d6a8cdbcd88ca6e2e0c7b91ab6d897ca89830c4ff1ececaaf0df05e249

  • SSDEEP

    24576:cyY2jqXwFqvrXZsVeppEX0tywAQWg+UZGfRhwcLXvRMKUPR:LxjqXwirSWY0tymRGdXpMLP

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26a2cda7a1e823b15014df6457ead29cc24ca1e9d7348e5f7ce65fac3e640998.exe
    "C:\Users\Admin\AppData\Local\Temp\26a2cda7a1e823b15014df6457ead29cc24ca1e9d7348e5f7ce65fac3e640998.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vk6py32.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vk6py32.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hL2LY94.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hL2LY94.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2GJ7514.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2GJ7514.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:520
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:1476
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 596
              5⤵
              • Program crash
              PID:4808
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3lh15Xn.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3lh15Xn.exe
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:344
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
              5⤵
              • Creates scheduled task(s)
              PID:3696
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
              5⤵
              • Creates scheduled task(s)
              PID:1068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 520 -ip 520
      1⤵
        PID:5052

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Scheduled Task/Job

      1
      T1053

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vk6py32.exe
        Filesize

        1.0MB

        MD5

        a73e73014d058c552d4d4caece68e74a

        SHA1

        aac61e4ca6964798ce2435da557f25c9d8d3fc5f

        SHA256

        ba7633951d62e23156dfce327cd0f3a36cdacac80ca48209628c093e687fc4e9

        SHA512

        1d65b4b8e7b8968430f14a77d83b02fa0077c3a68ea4cfe8c3030896174f1efdc1090efefca503eadc3511cc6e9e7fa37ba48c18f7b7276ac188a2fa10b4f33d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hL2LY94.exe
        Filesize

        946KB

        MD5

        44c279acb78d699381c3f28097539b24

        SHA1

        7128e4839540cb215c6132c707d8cf7a99edaf4f

        SHA256

        a39d3ff341bfb5c90d04a65464017ce9fad04ca0df5319810b250099233ca402

        SHA512

        95602538bbec80e08a6487e08634658e871c89ebd4ce25909bdaa925b960c7cf020249f49022f2d981f8f73dbc6db0a466aabe041d3d97fc3494c1eae4cd7543

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2GJ7514.exe
        Filesize

        1.1MB

        MD5

        5207cee391c428d2666438a7d9018b5d

        SHA1

        9a132811966083342c52e996fed13de4c9e1748e

        SHA256

        0fb467a149ba340e2d1a7c2d17b47638bc19a2a8b0e811d9e76afd4b8f144cd4

        SHA512

        21a33ea00392f37c984253cd4bcc9d7282c90154f53d25a8675513dbe7f556cc90a303f3da20dd15f5b8ac0d463e99e69c71e98d133b24ca0dd86269ae81231a

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3lh15Xn.exe
        Filesize

        1.3MB

        MD5

        712f17e627cf44c17946798512d49dc1

        SHA1

        d448475d5089f6aa263072e245647fc69abbf17b

        SHA256

        accfe94a5c8ac0a3c134a510cbcc08079b233fba1fe24e0e4036a7e8445ba810

        SHA512

        69be4649d213221581f6c99e14d3fecb71b997aadf91694ab60fb2c72eafe197e6cc8f53ad283aba56eabab56f3ca163a5deea92f290b53e0c75be2f82411ef2

      • memory/1476-24-0x0000000002950000-0x000000000295A000-memory.dmp
        Filesize

        40KB

      • memory/1476-23-0x0000000007520000-0x00000000075B2000-memory.dmp
        Filesize

        584KB

      • memory/1476-22-0x0000000007A30000-0x0000000007FD4000-memory.dmp
        Filesize

        5.6MB

      • memory/1476-21-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB

      • memory/1476-34-0x0000000008600000-0x0000000008C18000-memory.dmp
        Filesize

        6.1MB

      • memory/1476-35-0x0000000007880000-0x000000000798A000-memory.dmp
        Filesize

        1.0MB

      • memory/1476-36-0x0000000007720000-0x0000000007732000-memory.dmp
        Filesize

        72KB

      • memory/1476-37-0x00000000077B0000-0x00000000077EC000-memory.dmp
        Filesize

        240KB

      • memory/1476-39-0x00000000077F0000-0x000000000783C000-memory.dmp
        Filesize

        304KB