Overview
overview
10Static
static
30eb0accf09...b2.exe
windows10-2004-x64
1024941336d0...72.exe
windows10-2004-x64
1026a2cda7a1...98.exe
windows10-2004-x64
1029d3a95944...db.exe
windows10-2004-x64
102d75908c07...9b.exe
windows10-2004-x64
1033aed805e1...e6.exe
windows10-2004-x64
1040d8e0aa1d...18.exe
windows10-2004-x64
1048cb6f7d0b...c9.exe
windows10-2004-x64
10542eb4afaa...9a.exe
windows10-2004-x64
106f328c3e1d...2a.exe
windows10-2004-x64
1074692ca9aa...ea.exe
windows10-2004-x64
10759eb38c21...de.exe
windows10-2004-x64
10858cb57de5...0c.exe
windows10-2004-x64
109bd29cf05e...27.exe
windows10-2004-x64
7b0555f3c53...33.exe
windows10-2004-x64
10bde148bc51...21.exe
windows10-2004-x64
10c7e81c0377...b0.exe
windows7-x64
10c7e81c0377...b0.exe
windows10-2004-x64
10d0c5f5c327...0e.exe
windows10-2004-x64
10d165dd7703...70.exe
windows7-x64
10d165dd7703...70.exe
windows10-2004-x64
10d9645ca9ce...5b.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
0eb0accf09d83ec290b068c81be5e6c35e15cd72f8c10f74ea2ed429b7fcc8b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
24941336d0128a7ae974066981d3a1f75cc9af91a69a49b292688943f69afa72.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
26a2cda7a1e823b15014df6457ead29cc24ca1e9d7348e5f7ce65fac3e640998.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
29d3a95944732180e7b649fa96bb2f15636a9658a83828117964eea5a39c72db.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2d75908c0774dcb3f45e676b4c83554e0c2c94a1e96fd64e163484e0dbbf359b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
33aed805e114f04f73f867fdb7cf904e15447aa47f74e094c024c9b18c217fe6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
40d8e0aa1d01acecacb5b454de82773c5a4b5f13ec3abf8ee0ce0c906690a918.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
542eb4afaab2b90e95d070cb150ef76e8faa23f3afdd12ab49978cbb72dd389a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6f328c3e1d2f3ad40a09cd133e1964bbc4fc21dcbb7af8520e97006992426b2a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
74692ca9aa25e702576e835faf8a87d99d208bf02a87a5cd0cca52088e2e27ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
858cb57de5b9461a30d4dfd6c797315d00f9582d8210518ba989d761e6fb490c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bd29cf05e48e1f9b5f02750f58864848d24e66aab5b629f9133b674bc59b527.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b0555f3c536302c5af72051c3c2bc10649a88011e7aa16d3c661971df2866f33.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
bde148bc512eb25836030bebc3cbfd472cef53289015dbf4126dd1366b1c6421.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c7e81c037737d5a821cf236c8453b7b00607cd99d42863e39e0d703c731be6b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
c7e81c037737d5a821cf236c8453b7b00607cd99d42863e39e0d703c731be6b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d165dd77039589d5d25d898e400cb1806ef4225f7b6af17c51cc83c2ec12d070.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
d165dd77039589d5d25d898e400cb1806ef4225f7b6af17c51cc83c2ec12d070.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe
Resource
win10v2004-20240508-en
General
-
Target
d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe
-
Size
2.7MB
-
MD5
f67f35ac7610cbe97a565edb1bb21888
-
SHA1
b1e29296bf2ce79986ce6a6e838cec54674b41a6
-
SHA256
d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e
-
SHA512
51cbe2476a144e6627ba4b255e34356474a5b8767bf3771a452bb2842149d04fa77332165e42bbce8868d70d7e9336332456efbcb21c725c10c8d9d728a8513a
-
SSDEEP
49152:XDCyB8KcRG7A2LrmPovoLFXU44EMT7OGxV8vFamCkRyNo+n8a:ZO1G7A2LcowLqPEC7Oe8vAmCkwn9
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral19/memory/3564-28-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Drops startup file 1 IoCs
Processes:
3be78vH.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 3be78vH.exe -
Executes dropped EXE 5 IoCs
Processes:
pt1jj85.exewL8lv90.exeKN6aQ97.exe2iB8864.exe3be78vH.exepid process 3556 pt1jj85.exe 452 wL8lv90.exe 3324 KN6aQ97.exe 3356 2iB8864.exe 3420 3be78vH.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
wL8lv90.exeKN6aQ97.exe3be78vH.exed0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exept1jj85.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" wL8lv90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" KN6aQ97.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 3be78vH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pt1jj85.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2iB8864.exedescription pid process target process PID 3356 set thread context of 3564 3356 2iB8864.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2832 schtasks.exe 5064 schtasks.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exept1jj85.exewL8lv90.exeKN6aQ97.exe2iB8864.exe3be78vH.exedescription pid process target process PID 4868 wrote to memory of 3556 4868 d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe pt1jj85.exe PID 4868 wrote to memory of 3556 4868 d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe pt1jj85.exe PID 4868 wrote to memory of 3556 4868 d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe pt1jj85.exe PID 3556 wrote to memory of 452 3556 pt1jj85.exe wL8lv90.exe PID 3556 wrote to memory of 452 3556 pt1jj85.exe wL8lv90.exe PID 3556 wrote to memory of 452 3556 pt1jj85.exe wL8lv90.exe PID 452 wrote to memory of 3324 452 wL8lv90.exe KN6aQ97.exe PID 452 wrote to memory of 3324 452 wL8lv90.exe KN6aQ97.exe PID 452 wrote to memory of 3324 452 wL8lv90.exe KN6aQ97.exe PID 3324 wrote to memory of 3356 3324 KN6aQ97.exe 2iB8864.exe PID 3324 wrote to memory of 3356 3324 KN6aQ97.exe 2iB8864.exe PID 3324 wrote to memory of 3356 3324 KN6aQ97.exe 2iB8864.exe PID 3356 wrote to memory of 3564 3356 2iB8864.exe AppLaunch.exe PID 3356 wrote to memory of 3564 3356 2iB8864.exe AppLaunch.exe PID 3356 wrote to memory of 3564 3356 2iB8864.exe AppLaunch.exe PID 3356 wrote to memory of 3564 3356 2iB8864.exe AppLaunch.exe PID 3356 wrote to memory of 3564 3356 2iB8864.exe AppLaunch.exe PID 3356 wrote to memory of 3564 3356 2iB8864.exe AppLaunch.exe PID 3356 wrote to memory of 3564 3356 2iB8864.exe AppLaunch.exe PID 3356 wrote to memory of 3564 3356 2iB8864.exe AppLaunch.exe PID 3324 wrote to memory of 3420 3324 KN6aQ97.exe 3be78vH.exe PID 3324 wrote to memory of 3420 3324 KN6aQ97.exe 3be78vH.exe PID 3324 wrote to memory of 3420 3324 KN6aQ97.exe 3be78vH.exe PID 3420 wrote to memory of 2832 3420 3be78vH.exe schtasks.exe PID 3420 wrote to memory of 2832 3420 3be78vH.exe schtasks.exe PID 3420 wrote to memory of 2832 3420 3be78vH.exe schtasks.exe PID 3420 wrote to memory of 5064 3420 3be78vH.exe schtasks.exe PID 3420 wrote to memory of 5064 3420 3be78vH.exe schtasks.exe PID 3420 wrote to memory of 5064 3420 3be78vH.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe"C:\Users\Admin\AppData\Local\Temp\d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pt1jj85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pt1jj85.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wL8lv90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wL8lv90.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\KN6aQ97.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\KN6aQ97.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2iB8864.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2iB8864.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3564
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3be78vH.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3be78vH.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:2832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:5064
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4028,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=3980 /prefetch:81⤵PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5856d53e39dfe9b19f16ddbcb7527ec1c
SHA1c93bca96739f8c46e02e622659e056bd7f013903
SHA2562d8cde3148a5cf90d740ca95624e990f56e2d543aa387cb688d0286d36d69f9c
SHA512682e9bfaf985da40d5ede1093638631c92a49e5194653449c1d7e25ed2a21db5c6974f3b58fc76c5d570a7886fb81562769803101faa3dfdc4cff8a8dd357530
-
Filesize
1.2MB
MD54ff5123767d84fe552518b31a0cfb73d
SHA1b3d146e7ec87b7b898b747edfc0f46201ab61e69
SHA25647fc49574d1b3be00ad09eb0085f9b898cfc112e7bc398245b0c29438a579257
SHA512a4efb4800a7f0f43fc8fb661e10e241f5c7071bff14953c208248826159d2250a1f111fe8bbee20082f8c4f9aad6c5981f10ca79d9b25ba399a08e7c359ed62c
-
Filesize
1.1MB
MD56980c1088a0a2c4cee438e328613242e
SHA1d18ec494cd93ccfdba62c992b2d3c33298e15862
SHA2568e873a2c8996f82b8074895af909e112f554ec03aff012db4adcfa9fa93a3ff9
SHA512e00b24582f8f231be5262fd0b1f934823b472091d29687e840945bff9e42265f10d99ea5b9d971401895325961dd9615bfb4ff6ce2b3982e1f9023a70c44be4e
-
Filesize
1.9MB
MD5a760819157daf3eb6ed2eb5cf1c1542d
SHA1bbdee89a84d7a1e34c4fb89ee89f891eeca23cf7
SHA25642965b93b3381a67782d1162777f6a7e4cab72ede66081d648c8608acc330983
SHA51246a9576cd80316229c226367232f66f2e170ebaa60cf2b25128e392016c611c0f555354d3e216574e860f6307be40aed533cc2cc60b192a8e751cf229c97312d
-
Filesize
1.3MB
MD5b3494ab8d5b48563caef32cd4c31d81e
SHA10fe13a913168c3855ea9516203b960e7f0a19bf7
SHA25675d8bf7d6c3ec973b0df24372060410c08dcc92db4f9602fb63b9e421f8b9fe7
SHA512058aa10967eaf4f1344cea8bcc396d5cff4482dc97f64bcd957b63f83015e670e51e28525b048d8477aa4ebe486c19620c333b91df95a79a8fbbb29bd1c4ea47