Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
9db32f8b6fccc3522c0d3090c749917cf2b93cfbcdab0eeb97b364ab3a92c2d3.exe
Resource
win10v2004-20231023-en
General
-
Target
9db32f8b6fccc3522c0d3090c749917cf2b93cfbcdab0eeb97b364ab3a92c2d3.exe
-
Size
1.6MB
-
MD5
89415ceda0830bce138416614bf77735
-
SHA1
b8de604c4d321e4f2b6b7158da0f47ceddecc8de
-
SHA256
9db32f8b6fccc3522c0d3090c749917cf2b93cfbcdab0eeb97b364ab3a92c2d3
-
SHA512
9c5c1b8c7e69b1257b74185d6faacdd036a91b6e002ab5df5647a04791d65e1abee90773130bd195677f36c7157c31c9fb5f8e73d5b13a93d356ae5550f12e24
-
SSDEEP
49152:xgLdlq2165F9gR9SJu68XTElWG/bDUJgRj:W3qS44SMXT+WG/r
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 2lo7738.exe -
Executes dropped EXE 3 IoCs
pid Process 1812 BX0tw81.exe 2728 Ds3Hy79.exe 1192 2lo7738.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ds3Hy79.exe Set value (str) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 2lo7738.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9db32f8b6fccc3522c0d3090c749917cf2b93cfbcdab0eeb97b364ab3a92c2d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" BX0tw81.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1232 schtasks.exe 2452 schtasks.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4664 wrote to memory of 1812 4664 9db32f8b6fccc3522c0d3090c749917cf2b93cfbcdab0eeb97b364ab3a92c2d3.exe 86 PID 4664 wrote to memory of 1812 4664 9db32f8b6fccc3522c0d3090c749917cf2b93cfbcdab0eeb97b364ab3a92c2d3.exe 86 PID 4664 wrote to memory of 1812 4664 9db32f8b6fccc3522c0d3090c749917cf2b93cfbcdab0eeb97b364ab3a92c2d3.exe 86 PID 1812 wrote to memory of 2728 1812 BX0tw81.exe 87 PID 1812 wrote to memory of 2728 1812 BX0tw81.exe 87 PID 1812 wrote to memory of 2728 1812 BX0tw81.exe 87 PID 2728 wrote to memory of 1192 2728 Ds3Hy79.exe 88 PID 2728 wrote to memory of 1192 2728 Ds3Hy79.exe 88 PID 2728 wrote to memory of 1192 2728 Ds3Hy79.exe 88 PID 1192 wrote to memory of 1232 1192 2lo7738.exe 89 PID 1192 wrote to memory of 1232 1192 2lo7738.exe 89 PID 1192 wrote to memory of 1232 1192 2lo7738.exe 89 PID 1192 wrote to memory of 2452 1192 2lo7738.exe 91 PID 1192 wrote to memory of 2452 1192 2lo7738.exe 91 PID 1192 wrote to memory of 2452 1192 2lo7738.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\9db32f8b6fccc3522c0d3090c749917cf2b93cfbcdab0eeb97b364ab3a92c2d3.exe"C:\Users\Admin\AppData\Local\Temp\9db32f8b6fccc3522c0d3090c749917cf2b93cfbcdab0eeb97b364ab3a92c2d3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BX0tw81.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BX0tw81.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ds3Hy79.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ds3Hy79.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2lo7738.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2lo7738.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:1232
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:2452
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD550873a23d0c98059e85a4b2128dc81fb
SHA1b3c6833b929aefbc82ecaa18863d52d04505f177
SHA2563caa43963bee94bb03c40c8d316729f40f3ef06f2a761a2cd6a8ffc1c1e70e63
SHA5120bf7cb05f73217ad6b77e40ee2db9b5da17600a3ecf234c56ad3c1bedc728d901db2dcebf2b2c40dff4be0de4e8ca5030f3bf9941bce532449609a5f32fa5d46
-
Filesize
1.2MB
MD521e7dc74978ecbeb61e1ac71adb4a1a6
SHA1f4da5185a017615b71de0661aec685708abac0f4
SHA2565e298357554229e2e2917fc1fe4246a6a1a644e04f41f51d8b94b5899f003003
SHA512f5f007efb2fd6d547994eaa409cac7876e59a2c80a1c88737888f17c6c905166a118ef2b2e5e879e4fb46bed03671709a2c8849980656d5ef9ff53bc62c83fed
-
Filesize
1.2MB
MD521e7dc74978ecbeb61e1ac71adb4a1a6
SHA1f4da5185a017615b71de0661aec685708abac0f4
SHA2565e298357554229e2e2917fc1fe4246a6a1a644e04f41f51d8b94b5899f003003
SHA512f5f007efb2fd6d547994eaa409cac7876e59a2c80a1c88737888f17c6c905166a118ef2b2e5e879e4fb46bed03671709a2c8849980656d5ef9ff53bc62c83fed
-
Filesize
1.0MB
MD51e4ade6e65248a4f9805e007534a6c0e
SHA1e0eab3a58b3a47a81c9fde243c4f1b11f631272f
SHA25647a8db3bb9feb374116a5d578fdccab2fab0c50c874877990272e1dcdb58d7e5
SHA512c4ff986e1e96fa60bf134f5d53fc5e7c3fcead270cda1658b5ad11ce9621b453f816f2dedb0cb7b4e30fa799508f3b534e83d6d94ac11d2c9650b5f82a0e56ab
-
Filesize
1.0MB
MD51e4ade6e65248a4f9805e007534a6c0e
SHA1e0eab3a58b3a47a81c9fde243c4f1b11f631272f
SHA25647a8db3bb9feb374116a5d578fdccab2fab0c50c874877990272e1dcdb58d7e5
SHA512c4ff986e1e96fa60bf134f5d53fc5e7c3fcead270cda1658b5ad11ce9621b453f816f2dedb0cb7b4e30fa799508f3b534e83d6d94ac11d2c9650b5f82a0e56ab
-
Filesize
1.3MB
MD550873a23d0c98059e85a4b2128dc81fb
SHA1b3c6833b929aefbc82ecaa18863d52d04505f177
SHA2563caa43963bee94bb03c40c8d316729f40f3ef06f2a761a2cd6a8ffc1c1e70e63
SHA5120bf7cb05f73217ad6b77e40ee2db9b5da17600a3ecf234c56ad3c1bedc728d901db2dcebf2b2c40dff4be0de4e8ca5030f3bf9941bce532449609a5f32fa5d46
-
Filesize
1.3MB
MD550873a23d0c98059e85a4b2128dc81fb
SHA1b3c6833b929aefbc82ecaa18863d52d04505f177
SHA2563caa43963bee94bb03c40c8d316729f40f3ef06f2a761a2cd6a8ffc1c1e70e63
SHA5120bf7cb05f73217ad6b77e40ee2db9b5da17600a3ecf234c56ad3c1bedc728d901db2dcebf2b2c40dff4be0de4e8ca5030f3bf9941bce532449609a5f32fa5d46