Overview
overview
10Static
static
32ac9284d26...2e.exe
windows10-2004-x64
1046054179cb...c6.exe
windows10-2004-x64
74da066114f...cb.exe
windows10-2004-x64
1052fd0a92cd...e8.exe
windows10-2004-x64
764b627f8b2...dc.exe
windows10-2004-x64
107343af2588...64.exe
windows10-2004-x64
10913938eed9...a6.exe
windows10-2004-x64
7963caa90e2...8b.exe
windows7-x64
10963caa90e2...8b.exe
windows10-2004-x64
10993b22cd0e...bb.exe
windows10-2004-x64
109e4d940a32...56.exe
windows10-2004-x64
10b093b62b3c...3a.exe
windows10-2004-x64
10b60133d8c6...87.exe
windows10-2004-x64
10b88e4acc8b...70.exe
windows10-2004-x64
10b9e66aabb2...21.exe
windows10-2004-x64
10ba66c3ba45...93.exe
windows10-2004-x64
10ca4dd99dd7...5e.exe
windows10-2004-x64
10da83df46c9...bd.exe
windows7-x64
10da83df46c9...bd.exe
windows10-2004-x64
10e40b073703...73.exe
windows10-2004-x64
10e90aeb6eb5...2c.exe
windows10-2004-x64
10fa7f367abb...e6.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 12:24
Static task
static1
Behavioral task
behavioral1
Sample
2ac9284d26694cef6e105c1d2811bfa8f9f4ad619164ac6068f85f79fdc93c2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
46054179cb2d9b509f8a1029b4d1b357f32a91ab0af933d26deeaaae266db1c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
4da066114fff05c7f108852d67f4151134d789b0b406c964771aa61acdaf28cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
52fd0a92cd193f49dd929ce5ff9680fad847ee599a1bcf1b3d85bf92a28149e8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
64b627f8b2e8627a31f5ccb6fd6d30c39a1cd72c7bf4eb689910c2ce78d646dc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
913938eed99c7cecb554ea106699cb053edd02b8f457631f7e810dff3f3bbfa6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
993b22cd0edfed671f3110dc80dd02946e17220bbeed7d83c7fc5abec04c3dbb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
9e4d940a325e9b72d46353fc864673d69a691a5708c222a2124623dbb1d29056.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
b093b62b3c10bec126678999d01ec29829b6cd97661fc6492cc56c7a9503c93a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b88e4acc8b5bc7d78960ffffe70c54c5b2d30e7010e22306b70f7cc6b4629370.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b9e66aabb221e3e3118a47d09299a0e6940e137a234b31c5a1aa3a72d2d96121.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
ba66c3ba45ca9b8976288e133180837ff25f0e016b2c79dc3945bba768329c93.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
ca4dd99dd7103ec05d0d43690019a1de3a654140e64a44ae16dc101ba0a5895e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
da83df46c9a090a82fe6e6cb5ea91ec010777168eccd438ca33ac3ac723c9ebd.exe
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
da83df46c9a090a82fe6e6cb5ea91ec010777168eccd438ca33ac3ac723c9ebd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
e40b0737038122a56b3737a041c631f84c0e0d0fd97111d05f689d73301a2e73.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
e90aeb6eb581fc03df5540f7bbbc8cb887bb885815085075594020a3e9b2ec2c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
fa7f367abb26ee1daca84a0703ee7110f42a619fee072651c4f5efff7f782ae6.exe
Resource
win10v2004-20240426-en
General
-
Target
7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164.exe
-
Size
2.7MB
-
MD5
c5cdbbdd202788ff8fa33f596c4ccaee
-
SHA1
e832a2983baf87f37d193a2a678b94d33388471d
-
SHA256
7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164
-
SHA512
851aa7fbf1cfe9478cd4b1945a5544774939cc3f2a382e4d2d154b3e0caf2cf25305871fd25eebb0e889234f9fb5247a88dccc00cadfcbfb639b936e54f6b886
-
SSDEEP
49152:1BewLNXu0gElU2JGxhn34DKD3HXSdsGj9Q9ytayBjrbElZjf3H/1vPG:KwLNXu01PGXKiXXSdsQiytT9bEfjv/12
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral6/memory/1440-28-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 3Vq11FO.exe -
Executes dropped EXE 5 IoCs
pid Process 1444 wW4yh73.exe 4424 JD9HQ64.exe 2508 Hb5un58.exe 2932 2yE1519.exe 1716 3Vq11FO.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" wW4yh73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" JD9HQ64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Hb5un58.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 3Vq11FO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2932 set thread context of 1440 2932 2yE1519.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4544 schtasks.exe 1848 schtasks.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2820 wrote to memory of 1444 2820 7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164.exe 83 PID 2820 wrote to memory of 1444 2820 7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164.exe 83 PID 2820 wrote to memory of 1444 2820 7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164.exe 83 PID 1444 wrote to memory of 4424 1444 wW4yh73.exe 84 PID 1444 wrote to memory of 4424 1444 wW4yh73.exe 84 PID 1444 wrote to memory of 4424 1444 wW4yh73.exe 84 PID 4424 wrote to memory of 2508 4424 JD9HQ64.exe 85 PID 4424 wrote to memory of 2508 4424 JD9HQ64.exe 85 PID 4424 wrote to memory of 2508 4424 JD9HQ64.exe 85 PID 2508 wrote to memory of 2932 2508 Hb5un58.exe 86 PID 2508 wrote to memory of 2932 2508 Hb5un58.exe 86 PID 2508 wrote to memory of 2932 2508 Hb5un58.exe 86 PID 2932 wrote to memory of 1440 2932 2yE1519.exe 96 PID 2932 wrote to memory of 1440 2932 2yE1519.exe 96 PID 2932 wrote to memory of 1440 2932 2yE1519.exe 96 PID 2932 wrote to memory of 1440 2932 2yE1519.exe 96 PID 2932 wrote to memory of 1440 2932 2yE1519.exe 96 PID 2932 wrote to memory of 1440 2932 2yE1519.exe 96 PID 2932 wrote to memory of 1440 2932 2yE1519.exe 96 PID 2932 wrote to memory of 1440 2932 2yE1519.exe 96 PID 2508 wrote to memory of 1716 2508 Hb5un58.exe 97 PID 2508 wrote to memory of 1716 2508 Hb5un58.exe 97 PID 2508 wrote to memory of 1716 2508 Hb5un58.exe 97 PID 1716 wrote to memory of 1848 1716 3Vq11FO.exe 98 PID 1716 wrote to memory of 1848 1716 3Vq11FO.exe 98 PID 1716 wrote to memory of 1848 1716 3Vq11FO.exe 98 PID 1716 wrote to memory of 4544 1716 3Vq11FO.exe 100 PID 1716 wrote to memory of 4544 1716 3Vq11FO.exe 100 PID 1716 wrote to memory of 4544 1716 3Vq11FO.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164.exe"C:\Users\Admin\AppData\Local\Temp\7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wW4yh73.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wW4yh73.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JD9HQ64.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JD9HQ64.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hb5un58.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hb5un58.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2yE1519.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2yE1519.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1440
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Vq11FO.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Vq11FO.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:1848
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:4544
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD55e7d22ce4a4bf08723fa70311da6e3ec
SHA125fe7bb5304184bc3fe99203b7ed2ced6bd48391
SHA256e7bbc0204a3901f935a98e541f67c4a41ee41ebb7f886c9f7b4a25440e4af40a
SHA512c53dde4ff66f14fc78cbd3b70a66382ff548e11dfeeb1744c5fd838b995329e3a0a135d418d4c94416fae2a1e25bb5f5ce4478dfc91da02f0e45b9955700913c
-
Filesize
1.2MB
MD5cd08eb4119726a1ce480959ef948f145
SHA1c6fa2ca19dd52ac0aabaf4a36336bc73a10a0983
SHA256d3d10f8534d8dba0e5f87ed7b4477b4efb8f8070d2213f17f2fdcbc33a30638c
SHA5127facc4ab82d463b0536c17f5cf7969e3639518fb28cd1cf84ae58d55269846caaa552168ea227d220730ea359259c7647932c0f976af61c3fb58df71e9e9d21e
-
Filesize
1.1MB
MD5d60d6b62902d19a156a3cd1952b7e208
SHA1ecaf08a060ec4dda7b1bd317b1054f5add9d4c13
SHA25605ebbcba94ba04f042f19d6ac7a8309e855e2f3712d17922dd090558aeeff549
SHA5120aa40d5e2d28f2f40ac073289f4361583e20832c9cac152fccd34480d4aefe39fd824e11dda2ff502977ee3ad34633580558a15bf1f6fdcb65e42cf329ec5923
-
Filesize
1.9MB
MD58ef708b42e4cdce607dc5720c3738531
SHA1e0e420cf0cb5bbe9d93535f267a7047a40428691
SHA256c6716d89cd574425e12a8b9195b4cba9932c212ec7c9f2bab2546c1940ee8531
SHA5123852010ed93bdde6bf8ee5c2b74362b10491807cf907f92277ab53e9307b1f48904deb6a8db542a332cb7f7d5d4bb2da80203577028eed64f97d8a65fd210a9c
-
Filesize
1.3MB
MD584f59f78ac277c10e1a4db1e3c623a32
SHA172feddb9ccd0c0c67537090589bffa8eb1fb7ce4
SHA256264f8f963e1429e0bef8cc52421814294e77d20c5de77c606405240ac26136d4
SHA512a290a285261f92ef857e7911356b10cd181ed9305f312aedd19188ec0b860fd0ca744a724857ae5d89a5ed590a20ce6057add919aef47a8cf82ed11312c213e9