Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 15:16
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231025-en
General
-
Target
file.exe
-
Size
5.5MB
-
MD5
3e40919e6f2125376062b90cb8b9f669
-
SHA1
81d603905adc0a987d044c24e9dc1cbf3f69b489
-
SHA256
0badddf41c8f5dc1a17e07fbc0b409094afa00a1f87ea791dce0be5dfffbc4ed
-
SHA512
b3ea2d719216163464d2c99222331a98aa003524ba6c13e5a01d171217fa3a9b816b72060b17afd9348229b69d0404ecd269086997412c1d7443844d7a78e091
-
SSDEEP
98304:LDDpKP4VkSQq4FeK668YNA95zfx6J2z6ANu23eL06ZMMG2dTyqF/b6OUV1:XVa4piD66NNmz2m6xl7HJ69V1
Malware Config
Extracted
risepro
194.169.175.128
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IEUpdater1.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IEUpdater1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IEUpdater1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation file.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster1.lnk file.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OperaConnect1.lnk file.exe -
Executes dropped EXE 1 IoCs
pid Process 3392 IEUpdater1.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3276-0-0x0000000000EC0000-0x0000000001E75000-memory.dmp themida behavioral2/memory/3276-1-0x0000000000EC0000-0x0000000001E75000-memory.dmp themida behavioral2/memory/3276-14-0x0000000000EC0000-0x0000000001E75000-memory.dmp themida behavioral2/memory/3276-15-0x0000000000EC0000-0x0000000001E75000-memory.dmp themida behavioral2/memory/3276-16-0x0000000000EC0000-0x0000000001E75000-memory.dmp themida behavioral2/memory/3276-17-0x0000000000EC0000-0x0000000001E75000-memory.dmp themida behavioral2/memory/3276-18-0x0000000000EC0000-0x0000000001E75000-memory.dmp themida behavioral2/memory/3276-19-0x0000000000EC0000-0x0000000001E75000-memory.dmp themida behavioral2/files/0x0006000000022e12-25.dat themida behavioral2/memory/3276-27-0x0000000000EC0000-0x0000000001E75000-memory.dmp themida behavioral2/files/0x000a000000022d9a-116.dat themida behavioral2/files/0x000a000000022d9a-117.dat themida behavioral2/memory/3392-118-0x0000000000CE0000-0x0000000001C95000-memory.dmp themida behavioral2/memory/3392-119-0x0000000000CE0000-0x0000000001C95000-memory.dmp themida behavioral2/memory/3276-126-0x0000000000EC0000-0x0000000001E75000-memory.dmp themida behavioral2/memory/3392-134-0x0000000000CE0000-0x0000000001C95000-memory.dmp themida behavioral2/memory/3392-135-0x0000000000CE0000-0x0000000001C95000-memory.dmp themida behavioral2/memory/3392-136-0x0000000000CE0000-0x0000000001C95000-memory.dmp themida behavioral2/memory/3392-137-0x0000000000CE0000-0x0000000001C95000-memory.dmp themida behavioral2/memory/3392-138-0x0000000000CE0000-0x0000000001C95000-memory.dmp themida behavioral2/memory/3392-139-0x0000000000CE0000-0x0000000001C95000-memory.dmp themida behavioral2/files/0x0006000000022e12-143.dat themida behavioral2/files/0x0006000000022e06-141.dat themida behavioral2/files/0x0006000000022e04-140.dat themida behavioral2/memory/3392-150-0x0000000000CE0000-0x0000000001C95000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe Key opened \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe Key opened \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LegalHelper1 = "C:\\Users\\Admin\\AppData\\Local\\LegalHelper1\\LegalHelper1.exe" file.exe Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest1 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest1\\MaxLoonaFest1.exe" file.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEUpdater1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 ipinfo.io 37 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3276 file.exe 3392 IEUpdater1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4428 schtasks.exe 1588 schtasks.exe 4392 schtasks.exe 4828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3276 file.exe 3276 file.exe 3276 file.exe 3276 file.exe 3392 IEUpdater1.exe 3392 IEUpdater1.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3276 wrote to memory of 4428 3276 file.exe 93 PID 3276 wrote to memory of 4428 3276 file.exe 93 PID 3276 wrote to memory of 4428 3276 file.exe 93 PID 3276 wrote to memory of 1588 3276 file.exe 96 PID 3276 wrote to memory of 1588 3276 file.exe 96 PID 3276 wrote to memory of 1588 3276 file.exe 96 PID 3276 wrote to memory of 4392 3276 file.exe 104 PID 3276 wrote to memory of 4392 3276 file.exe 104 PID 3276 wrote to memory of 4392 3276 file.exe 104 PID 3276 wrote to memory of 4828 3276 file.exe 106 PID 3276 wrote to memory of 4828 3276 file.exe 106 PID 3276 wrote to memory of 4828 3276 file.exe 106 PID 3276 wrote to memory of 3392 3276 file.exe 108 PID 3276 wrote to memory of 3392 3276 file.exe 108 PID 3276 wrote to memory of 3392 3276 file.exe 108 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3276 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP1\OfficeTrackerNMP1.exe" /tn "OfficeTrackerNMP1 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:4428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP1\OfficeTrackerNMP1.exe" /tn "OfficeTrackerNMP1 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:1588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\IEUpdater1\IEUpdater1.exe" /tn "IEUpdater1 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:4392
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\IEUpdater1\IEUpdater1.exe" /tn "IEUpdater1 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:4828
-
-
C:\ProgramData\IEUpdater1\IEUpdater1.exe"C:\ProgramData\IEUpdater1\IEUpdater1.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD53e40919e6f2125376062b90cb8b9f669
SHA181d603905adc0a987d044c24e9dc1cbf3f69b489
SHA2560badddf41c8f5dc1a17e07fbc0b409094afa00a1f87ea791dce0be5dfffbc4ed
SHA512b3ea2d719216163464d2c99222331a98aa003524ba6c13e5a01d171217fa3a9b816b72060b17afd9348229b69d0404ecd269086997412c1d7443844d7a78e091
-
Filesize
5.5MB
MD53e40919e6f2125376062b90cb8b9f669
SHA181d603905adc0a987d044c24e9dc1cbf3f69b489
SHA2560badddf41c8f5dc1a17e07fbc0b409094afa00a1f87ea791dce0be5dfffbc4ed
SHA512b3ea2d719216163464d2c99222331a98aa003524ba6c13e5a01d171217fa3a9b816b72060b17afd9348229b69d0404ecd269086997412c1d7443844d7a78e091
-
Filesize
5.5MB
MD53e40919e6f2125376062b90cb8b9f669
SHA181d603905adc0a987d044c24e9dc1cbf3f69b489
SHA2560badddf41c8f5dc1a17e07fbc0b409094afa00a1f87ea791dce0be5dfffbc4ed
SHA512b3ea2d719216163464d2c99222331a98aa003524ba6c13e5a01d171217fa3a9b816b72060b17afd9348229b69d0404ecd269086997412c1d7443844d7a78e091
-
Filesize
5.5MB
MD53e40919e6f2125376062b90cb8b9f669
SHA181d603905adc0a987d044c24e9dc1cbf3f69b489
SHA2560badddf41c8f5dc1a17e07fbc0b409094afa00a1f87ea791dce0be5dfffbc4ed
SHA512b3ea2d719216163464d2c99222331a98aa003524ba6c13e5a01d171217fa3a9b816b72060b17afd9348229b69d0404ecd269086997412c1d7443844d7a78e091
-
Filesize
5.5MB
MD53e40919e6f2125376062b90cb8b9f669
SHA181d603905adc0a987d044c24e9dc1cbf3f69b489
SHA2560badddf41c8f5dc1a17e07fbc0b409094afa00a1f87ea791dce0be5dfffbc4ed
SHA512b3ea2d719216163464d2c99222331a98aa003524ba6c13e5a01d171217fa3a9b816b72060b17afd9348229b69d0404ecd269086997412c1d7443844d7a78e091
-
Filesize
5.5MB
MD53e40919e6f2125376062b90cb8b9f669
SHA181d603905adc0a987d044c24e9dc1cbf3f69b489
SHA2560badddf41c8f5dc1a17e07fbc0b409094afa00a1f87ea791dce0be5dfffbc4ed
SHA512b3ea2d719216163464d2c99222331a98aa003524ba6c13e5a01d171217fa3a9b816b72060b17afd9348229b69d0404ecd269086997412c1d7443844d7a78e091
-
Filesize
13B
MD5272bd34e1222195bdbffe97f0359d42c
SHA1188314175db59a4006e6d03d69599006ee94d54e
SHA256529dca6e4094af3b1fac3f05fd43b4c36e58f862f53db9531d2cb1ad80b60da0
SHA512f873df913ea600b25dfd96556d615903a75948f41304e2739afab2cf8da58a0fd8d5a3b467bd0885c9679955182bafb7f457a143b5cda3948076cfd64b5c1f1a
-
Filesize
3KB
MD5d4d7f77634fdf57ff3ce0320a9b37dc1
SHA10014a9df9435d8e8d238982b68499984d4400704
SHA2565a29cb99d947c2b5e98bca48bee33850b4e18751aead76abd27ee12d7688cac4
SHA51278e85a28aa474312077a4c0c2078ece7f3e7f13684ffbaf324405894f426465572e5198dd81612ffd5cc314fdc95a227f14c4fd89488860af1b22f79850440d4
-
Filesize
1KB
MD577c54b70a415a28d622f8ac980d498d7
SHA118c3d57680a116dc9b10be70642922b35cfd17f6
SHA2560cfe08c7b11bfb6cc3f324a2452e3e8c6c40643783e05e55c8eef84b575e9028
SHA512c5fbb33b1d7578f1db5e28354c651a6ec9da3f0c60cc5ea00d67a9251a04a093ff7fc7ca664d716080f15d9329e8cd64779e1e11f8814e9349d31af911047446