Overview
overview
10Static
static
304079e5802...9d.exe
windows10-2004-x64
101c1f4eb981...3b.exe
windows10-2004-x64
102598a43559...cf.exe
windows10-2004-x64
103aa30d5528...5d.exe
windows10-2004-x64
1046e0ffa2e7...59.exe
windows10-2004-x64
104cc86e1dc4...05.exe
windows10-2004-x64
1061799398ea...0c.exe
windows10-2004-x64
106bfb353493...b4.exe
windows10-2004-x64
1070f5b2bcd0...c3.exe
windows7-x64
1070f5b2bcd0...c3.exe
windows10-2004-x64
107363065308...5d.exe
windows10-2004-x64
10864fc02972...03.exe
windows10-2004-x64
10979a085483...e6.exe
windows10-2004-x64
109bbc6ca861...5b.exe
windows10-2004-x64
10a22013e24e...09.exe
windows10-2004-x64
10c31e600a38...cd.exe
windows10-2004-x64
10e2e852038c...e5.exe
windows10-2004-x64
10ec4e6a678a...72.exe
windows10-2004-x64
10f46c47981f...85.exe
windows10-2004-x64
10f603ceb39f...6e.exe
windows10-2004-x64
10fbe6d8ed22...1a.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
04079e58020489439890f3d5d0980b8ad79ac8f655923829037345651f2f1b9d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1c1f4eb981ff56766e6798073020add168a1f4134cf43e140302c7cec4a6763b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3aa30d5528ebe1b7856b26587d689c01c4a94547c022f9b29bb7c32708782f5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
46e0ffa2e7aeb3575c3fe8308892dec47716f852e6427bc2c8e904e9cad2c659.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cc86e1dc4a166b675f01f27f52e179d83773f43736e54f40427866d6708ef05.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
61799398eaa0d8b997b6fa9158074d701b10e120c7cac093e92c6dfbd278f50c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
979a085483810f4b695eb3d0c531439887861b90277b6ede2d4f9eb7983065e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
e2e852038c1504d54c9702b961095f0af961417103d2a5c8b10740dc188ac5e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ec4e6a678a24fbc6072d65beb0203bf9dc01f768df9a7430ed0d827b8d290172.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f603ceb39fc4d835e57a02751723a2eb0538b0f955a7772c30556e0e0d723f6e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a.exe
Resource
win10v2004-20240426-en
General
-
Target
f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe
-
Size
935KB
-
MD5
29f8033f3fbdf91c2e89357c4b49602e
-
SHA1
d2d542baf9f23e26ba33885b633328e71e71f5c4
-
SHA256
f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85
-
SHA512
a3132e83c71a98612b408ecbc985b0ad7680a16893e8016514b24ecf0dba4bb6ae781f0513daa3efb29498ae8985f94ae63c13be285c2eb8e22f928afd115d9e
-
SSDEEP
24576:jyFWNEi4niX5JDHaWnqHbpoGkA4FJKMCGrru:2zJniXzaWnWt07pCGr
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral19/memory/4332-14-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Drops startup file 1 IoCs
Processes:
3qW67EY.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 3qW67EY.exe -
Executes dropped EXE 3 IoCs
Processes:
fh1le64.exe2mY3893.exe3qW67EY.exepid process 384 fh1le64.exe 3408 2mY3893.exe 5100 3qW67EY.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
fh1le64.exe3qW67EY.exef46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fh1le64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 3qW67EY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2mY3893.exedescription pid process target process PID 3408 set thread context of 4332 3408 2mY3893.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 520 3408 WerFault.exe 2mY3893.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3540 schtasks.exe 5104 schtasks.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exefh1le64.exe2mY3893.exe3qW67EY.exedescription pid process target process PID 3992 wrote to memory of 384 3992 f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe fh1le64.exe PID 3992 wrote to memory of 384 3992 f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe fh1le64.exe PID 3992 wrote to memory of 384 3992 f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe fh1le64.exe PID 384 wrote to memory of 3408 384 fh1le64.exe 2mY3893.exe PID 384 wrote to memory of 3408 384 fh1le64.exe 2mY3893.exe PID 384 wrote to memory of 3408 384 fh1le64.exe 2mY3893.exe PID 3408 wrote to memory of 4332 3408 2mY3893.exe AppLaunch.exe PID 3408 wrote to memory of 4332 3408 2mY3893.exe AppLaunch.exe PID 3408 wrote to memory of 4332 3408 2mY3893.exe AppLaunch.exe PID 3408 wrote to memory of 4332 3408 2mY3893.exe AppLaunch.exe PID 3408 wrote to memory of 4332 3408 2mY3893.exe AppLaunch.exe PID 3408 wrote to memory of 4332 3408 2mY3893.exe AppLaunch.exe PID 3408 wrote to memory of 4332 3408 2mY3893.exe AppLaunch.exe PID 3408 wrote to memory of 4332 3408 2mY3893.exe AppLaunch.exe PID 384 wrote to memory of 5100 384 fh1le64.exe 3qW67EY.exe PID 384 wrote to memory of 5100 384 fh1le64.exe 3qW67EY.exe PID 384 wrote to memory of 5100 384 fh1le64.exe 3qW67EY.exe PID 5100 wrote to memory of 3540 5100 3qW67EY.exe schtasks.exe PID 5100 wrote to memory of 3540 5100 3qW67EY.exe schtasks.exe PID 5100 wrote to memory of 3540 5100 3qW67EY.exe schtasks.exe PID 5100 wrote to memory of 5104 5100 3qW67EY.exe schtasks.exe PID 5100 wrote to memory of 5104 5100 3qW67EY.exe schtasks.exe PID 5100 wrote to memory of 5104 5100 3qW67EY.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe"C:\Users\Admin\AppData\Local\Temp\f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fh1le64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fh1le64.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2mY3893.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2mY3893.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 1404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3qW67EY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3qW67EY.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3408 -ip 34081⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fh1le64.exeFilesize
811KB
MD517c3abd1cbb560276dbc6b16cdecfdba
SHA18dab3c71f7ba847e037a6c1c4db1fe10b8e72732
SHA2562b355af97a8c03dcd7deaec65e882840dd5c8bf1fb2e4a5071bd779e628f25b6
SHA512234cc5752cdbff1b2f2b08e07f19e8d06c92ff758a00c90c4f38ba9ed965af355d5812a5801744ea27013651ce6f31baa16aea0774368f8dff0b9c797ebeda06
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2mY3893.exeFilesize
432KB
MD5b86658f28e3cc7a49271b015c9aefaad
SHA12ba24a865917af376eaea66b76db6bc148fbfaac
SHA2563a60a03ad579df890125bd5be83047a41d63a287b1f99fa10e49175ced42e76b
SHA512fe551a7c974287df73b10b6acd9b01c6bc5d9247bfc381c55f434cf48851503d44d05446152e1a6f7ae78a6f971003db5dabe171c7abecd99748b91b3208d3ab
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3qW67EY.exeFilesize
1.3MB
MD5370232f382fad5472b4d6f67fd588f0a
SHA1ee5dff4fc801c398218e542cc6448bf8c6b6c151
SHA256e09a8cd2fc52501df33ee97688d2ebc83db62e3836dd4a15ed7ac66fd9f5188d
SHA512223e3336e1feb30626f1756ddfd4aecee372dfefd7e845d8b9f3106e697131f37ff0a2ea22afce3683def25b60e5d425b0a1a5feb42f62fc4a0cb270e34ab444
-
memory/4332-18-0x0000000004E10000-0x0000000004E1A000-memory.dmpFilesize
40KB
-
memory/4332-16-0x0000000007D90000-0x0000000008334000-memory.dmpFilesize
5.6MB
-
memory/4332-17-0x0000000007880000-0x0000000007912000-memory.dmpFilesize
584KB
-
memory/4332-15-0x0000000073F5E000-0x0000000073F5F000-memory.dmpFilesize
4KB
-
memory/4332-14-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4332-22-0x0000000008960000-0x0000000008F78000-memory.dmpFilesize
6.1MB
-
memory/4332-25-0x0000000008340000-0x000000000844A000-memory.dmpFilesize
1.0MB
-
memory/4332-26-0x0000000007840000-0x0000000007852000-memory.dmpFilesize
72KB
-
memory/4332-27-0x0000000007A50000-0x0000000007A8C000-memory.dmpFilesize
240KB
-
memory/4332-32-0x0000000007AB0000-0x0000000007AFC000-memory.dmpFilesize
304KB
-
memory/4332-34-0x0000000073F5E000-0x0000000073F5F000-memory.dmpFilesize
4KB