Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    161s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/11/2023, 17:33

General

  • Target

    82fcedb528a5e773323d4e9a698898388d2c56931a24df7f1899b0b9f5f87c3c.exe

  • Size

    3.2MB

  • MD5

    6dc2b73b2b565a00420401c863b33764

  • SHA1

    0d6624fea63909298de26485dd5804f81a22840b

  • SHA256

    82fcedb528a5e773323d4e9a698898388d2c56931a24df7f1899b0b9f5f87c3c

  • SHA512

    e3743f4bb7da69d1e9e9a882ce3da92eb31f98ff510f1e83c0c20ea42d5b94d7c34cf4e55e764f8e70a24e0ec0ad8abc6b096f39024582f812a8b10c5db8fad1

  • SSDEEP

    49152:aMbwMc13tn/rx+h6a3vHAm8TXVEG1JaC8Pv3gcJO+1:Vux+oAGvIPv3gcJOe

Malware Config

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82fcedb528a5e773323d4e9a698898388d2c56931a24df7f1899b0b9f5f87c3c.exe
    "C:\Users\Admin\AppData\Local\Temp\82fcedb528a5e773323d4e9a698898388d2c56931a24df7f1899b0b9f5f87c3c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3872
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:3684
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:3664
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
        1⤵
          PID:212
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1404

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

          Filesize

          16KB

          MD5

          c74b5fbe7c09a43b1e417fbb2b411c2c

          SHA1

          23ac3f891aa2c6e2fd3cdee18f1a55c3143c208d

          SHA256

          2912b94cd6e0f89a7e59e0da646cda1b659f73ab16961a5f636b0985cee47c8c

          SHA512

          c4d99840a9061aa520bde3f518cd5f0b07cf5822a76cf57453a49f877b888d011d26a59cd7912a1b1e11577a97d6ecd89c26d8e4d771beaa95ba24b64605281e

        • memory/1404-42-0x000001ADC9330000-0x000001ADC9331000-memory.dmp

          Filesize

          4KB

        • memory/1404-68-0x000001ADC9090000-0x000001ADC9091000-memory.dmp

          Filesize

          4KB

        • memory/1404-72-0x000001ADC91B0000-0x000001ADC91B1000-memory.dmp

          Filesize

          4KB

        • memory/1404-4-0x000001ADC0C40000-0x000001ADC0C50000-memory.dmp

          Filesize

          64KB

        • memory/1404-20-0x000001ADC0D40000-0x000001ADC0D50000-memory.dmp

          Filesize

          64KB

        • memory/1404-36-0x000001ADC9310000-0x000001ADC9311000-memory.dmp

          Filesize

          4KB

        • memory/1404-37-0x000001ADC9330000-0x000001ADC9331000-memory.dmp

          Filesize

          4KB

        • memory/1404-38-0x000001ADC9330000-0x000001ADC9331000-memory.dmp

          Filesize

          4KB

        • memory/1404-39-0x000001ADC9330000-0x000001ADC9331000-memory.dmp

          Filesize

          4KB

        • memory/1404-40-0x000001ADC9330000-0x000001ADC9331000-memory.dmp

          Filesize

          4KB

        • memory/1404-41-0x000001ADC9330000-0x000001ADC9331000-memory.dmp

          Filesize

          4KB

        • memory/1404-71-0x000001ADC90A0000-0x000001ADC90A1000-memory.dmp

          Filesize

          4KB

        • memory/1404-70-0x000001ADC90A0000-0x000001ADC90A1000-memory.dmp

          Filesize

          4KB

        • memory/1404-43-0x000001ADC9330000-0x000001ADC9331000-memory.dmp

          Filesize

          4KB

        • memory/1404-50-0x000001ADC8F60000-0x000001ADC8F61000-memory.dmp

          Filesize

          4KB

        • memory/1404-46-0x000001ADC9330000-0x000001ADC9331000-memory.dmp

          Filesize

          4KB

        • memory/1404-47-0x000001ADC8F60000-0x000001ADC8F61000-memory.dmp

          Filesize

          4KB

        • memory/1404-48-0x000001ADC8F50000-0x000001ADC8F51000-memory.dmp

          Filesize

          4KB

        • memory/1404-45-0x000001ADC9330000-0x000001ADC9331000-memory.dmp

          Filesize

          4KB

        • memory/1404-53-0x000001ADC8F50000-0x000001ADC8F51000-memory.dmp

          Filesize

          4KB

        • memory/1404-56-0x000001ADC8E90000-0x000001ADC8E91000-memory.dmp

          Filesize

          4KB

        • memory/1404-44-0x000001ADC9330000-0x000001ADC9331000-memory.dmp

          Filesize

          4KB

        • memory/3664-1-0x0000000000400000-0x0000000000547000-memory.dmp

          Filesize

          1.3MB

        • memory/3664-2-0x0000000000400000-0x0000000000547000-memory.dmp

          Filesize

          1.3MB

        • memory/3664-0-0x0000000000400000-0x0000000000547000-memory.dmp

          Filesize

          1.3MB

        • memory/3664-3-0x0000000000400000-0x0000000000547000-memory.dmp

          Filesize

          1.3MB