Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 08:41

General

  • Target

    f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe

  • Size

    935KB

  • MD5

    29f8033f3fbdf91c2e89357c4b49602e

  • SHA1

    d2d542baf9f23e26ba33885b633328e71e71f5c4

  • SHA256

    f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85

  • SHA512

    a3132e83c71a98612b408ecbc985b0ad7680a16893e8016514b24ecf0dba4bb6ae781f0513daa3efb29498ae8985f94ae63c13be285c2eb8e22f928afd115d9e

  • SSDEEP

    24576:jyFWNEi4niX5JDHaWnqHbpoGkA4FJKMCGrru:2zJniXzaWnWt07pCGr

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe
    "C:\Users\Admin\AppData\Local\Temp\f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fh1le64.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fh1le64.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2mY3893.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2mY3893.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3408
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:4332
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 140
            4⤵
            • Program crash
            PID:520
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3qW67EY.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3qW67EY.exe
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5100
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
            4⤵
            • Creates scheduled task(s)
            PID:3540
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
            4⤵
            • Creates scheduled task(s)
            PID:5104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3408 -ip 3408
      1⤵
        PID:2956

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Scheduled Task/Job

      1
      T1053

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fh1le64.exe
        Filesize

        811KB

        MD5

        17c3abd1cbb560276dbc6b16cdecfdba

        SHA1

        8dab3c71f7ba847e037a6c1c4db1fe10b8e72732

        SHA256

        2b355af97a8c03dcd7deaec65e882840dd5c8bf1fb2e4a5071bd779e628f25b6

        SHA512

        234cc5752cdbff1b2f2b08e07f19e8d06c92ff758a00c90c4f38ba9ed965af355d5812a5801744ea27013651ce6f31baa16aea0774368f8dff0b9c797ebeda06

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2mY3893.exe
        Filesize

        432KB

        MD5

        b86658f28e3cc7a49271b015c9aefaad

        SHA1

        2ba24a865917af376eaea66b76db6bc148fbfaac

        SHA256

        3a60a03ad579df890125bd5be83047a41d63a287b1f99fa10e49175ced42e76b

        SHA512

        fe551a7c974287df73b10b6acd9b01c6bc5d9247bfc381c55f434cf48851503d44d05446152e1a6f7ae78a6f971003db5dabe171c7abecd99748b91b3208d3ab

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3qW67EY.exe
        Filesize

        1.3MB

        MD5

        370232f382fad5472b4d6f67fd588f0a

        SHA1

        ee5dff4fc801c398218e542cc6448bf8c6b6c151

        SHA256

        e09a8cd2fc52501df33ee97688d2ebc83db62e3836dd4a15ed7ac66fd9f5188d

        SHA512

        223e3336e1feb30626f1756ddfd4aecee372dfefd7e845d8b9f3106e697131f37ff0a2ea22afce3683def25b60e5d425b0a1a5feb42f62fc4a0cb270e34ab444

      • memory/4332-18-0x0000000004E10000-0x0000000004E1A000-memory.dmp
        Filesize

        40KB

      • memory/4332-16-0x0000000007D90000-0x0000000008334000-memory.dmp
        Filesize

        5.6MB

      • memory/4332-17-0x0000000007880000-0x0000000007912000-memory.dmp
        Filesize

        584KB

      • memory/4332-15-0x0000000073F5E000-0x0000000073F5F000-memory.dmp
        Filesize

        4KB

      • memory/4332-14-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB

      • memory/4332-22-0x0000000008960000-0x0000000008F78000-memory.dmp
        Filesize

        6.1MB

      • memory/4332-25-0x0000000008340000-0x000000000844A000-memory.dmp
        Filesize

        1.0MB

      • memory/4332-26-0x0000000007840000-0x0000000007852000-memory.dmp
        Filesize

        72KB

      • memory/4332-27-0x0000000007A50000-0x0000000007A8C000-memory.dmp
        Filesize

        240KB

      • memory/4332-32-0x0000000007AB0000-0x0000000007AFC000-memory.dmp
        Filesize

        304KB

      • memory/4332-34-0x0000000073F5E000-0x0000000073F5F000-memory.dmp
        Filesize

        4KB