Analysis
-
max time kernel
137s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe
Resource
win10v2004-20231023-en
General
-
Target
6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe
-
Size
1.9MB
-
MD5
ef0108fafae2993a2afaf507b547a4f9
-
SHA1
efdc9cca39d039576c0b1328d6fa7359886f1641
-
SHA256
6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee
-
SHA512
73bc0276d46fe696697014cdbe3254651f0c7a4c073ca544a28d4b6a7c14915caa2e1a10af19b11cb2af34b590dbb894928865018d9bd6b1c33973f9aabf2983
-
SSDEEP
24576:hyaV+F2BKb+qiUpuz4BA6LCGjpRMsXJ9a+Vv18DAbg7dmNxZk18WJNQ:UUBgbsj4K6TX/9F87dmNxZ9W
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1Kx39hx6.exe -
Executes dropped EXE 4 IoCs
pid Process 4456 PP2mc19.exe 3692 iz2bR50.exe 2576 IZ7kk17.exe 2784 1Kx39hx6.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" PP2mc19.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" iz2bR50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" IZ7kk17.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1Kx39hx6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2808 schtasks.exe 1908 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4256 wrote to memory of 4456 4256 6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe 86 PID 4256 wrote to memory of 4456 4256 6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe 86 PID 4256 wrote to memory of 4456 4256 6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe 86 PID 4456 wrote to memory of 3692 4456 PP2mc19.exe 87 PID 4456 wrote to memory of 3692 4456 PP2mc19.exe 87 PID 4456 wrote to memory of 3692 4456 PP2mc19.exe 87 PID 3692 wrote to memory of 2576 3692 iz2bR50.exe 89 PID 3692 wrote to memory of 2576 3692 iz2bR50.exe 89 PID 3692 wrote to memory of 2576 3692 iz2bR50.exe 89 PID 2576 wrote to memory of 2784 2576 IZ7kk17.exe 90 PID 2576 wrote to memory of 2784 2576 IZ7kk17.exe 90 PID 2576 wrote to memory of 2784 2576 IZ7kk17.exe 90 PID 2784 wrote to memory of 2808 2784 1Kx39hx6.exe 91 PID 2784 wrote to memory of 2808 2784 1Kx39hx6.exe 91 PID 2784 wrote to memory of 2808 2784 1Kx39hx6.exe 91 PID 2784 wrote to memory of 1908 2784 1Kx39hx6.exe 93 PID 2784 wrote to memory of 1908 2784 1Kx39hx6.exe 93 PID 2784 wrote to memory of 1908 2784 1Kx39hx6.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe"C:\Users\Admin\AppData\Local\Temp\6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PP2mc19.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PP2mc19.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iz2bR50.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iz2bR50.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ7kk17.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ7kk17.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kx39hx6.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kx39hx6.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:2808
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:1908
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD54d92ab1ff6d2b3b7fe450f66efce4b76
SHA173fc6f8d8ffca42c314911bdfd8e01480c558608
SHA25688258e9da65a57689be4fec2302153f42287001c9ecf3b7b0fbde6b4b67dae64
SHA512ed1a7ef7b60b93cdda777eb1d826f2032ce5d6ccb9a50f5308775bff64b91f4aec44515b573c77816c0c6654f39d49197639a55fbc97f482209471130ce3760e
-
Filesize
1.6MB
MD567493eabdb187b3a0bc9806d281dbcdb
SHA1fa77b287321f5ebf346d88248ece652fe4991b17
SHA25643fcf5962ad5eeb11373ae0c373622ec84a9d75db29af9cebda1efd666c20646
SHA512a0d7fd9435e8a1d42c25b7c30314d5c444594fe24d6a9a69c258ef0ad253741a5277a690c8a2fb363a9e701eb254db62c7eef17b7286049b67ff081eccb74841
-
Filesize
1.6MB
MD567493eabdb187b3a0bc9806d281dbcdb
SHA1fa77b287321f5ebf346d88248ece652fe4991b17
SHA25643fcf5962ad5eeb11373ae0c373622ec84a9d75db29af9cebda1efd666c20646
SHA512a0d7fd9435e8a1d42c25b7c30314d5c444594fe24d6a9a69c258ef0ad253741a5277a690c8a2fb363a9e701eb254db62c7eef17b7286049b67ff081eccb74841
-
Filesize
1.1MB
MD53e59b61545307b4965551328393d33b0
SHA1b6b0f74594635cf2359f1b0809b5d279133b20d8
SHA2564bbf574ff581675b9a1b38c3a0847c45e3d432e37f4f786b0631e97e5b1e68e5
SHA512ed09de55fec9c870cb3a69fbaefffe4ed2501505f0de37a11055033b22af23b0b8f28fe60e480250a7669de400c149fbca70efa3a41c50e5968c73909b80b0a7
-
Filesize
1.1MB
MD53e59b61545307b4965551328393d33b0
SHA1b6b0f74594635cf2359f1b0809b5d279133b20d8
SHA2564bbf574ff581675b9a1b38c3a0847c45e3d432e37f4f786b0631e97e5b1e68e5
SHA512ed09de55fec9c870cb3a69fbaefffe4ed2501505f0de37a11055033b22af23b0b8f28fe60e480250a7669de400c149fbca70efa3a41c50e5968c73909b80b0a7
-
Filesize
1006KB
MD5746e3fba274c75ec5053f72f0ce644b2
SHA17052c5f4ff04176140dacb4e5ee145de153c6e36
SHA25631c5e5a7c52e6946abc7a4b321e273a8436ba86277c15be44c07e12f3905c4dc
SHA512dd9184dbf1bc02ef42607115fbfcd1d3464cb992dcfc18484d36033ebb2ad33c48ec06c4f820530ed14226d4815921851759623e4dd7677905bc60d5072de7ec
-
Filesize
1006KB
MD5746e3fba274c75ec5053f72f0ce644b2
SHA17052c5f4ff04176140dacb4e5ee145de153c6e36
SHA25631c5e5a7c52e6946abc7a4b321e273a8436ba86277c15be44c07e12f3905c4dc
SHA512dd9184dbf1bc02ef42607115fbfcd1d3464cb992dcfc18484d36033ebb2ad33c48ec06c4f820530ed14226d4815921851759623e4dd7677905bc60d5072de7ec
-
Filesize
1.5MB
MD54d92ab1ff6d2b3b7fe450f66efce4b76
SHA173fc6f8d8ffca42c314911bdfd8e01480c558608
SHA25688258e9da65a57689be4fec2302153f42287001c9ecf3b7b0fbde6b4b67dae64
SHA512ed1a7ef7b60b93cdda777eb1d826f2032ce5d6ccb9a50f5308775bff64b91f4aec44515b573c77816c0c6654f39d49197639a55fbc97f482209471130ce3760e
-
Filesize
1.5MB
MD54d92ab1ff6d2b3b7fe450f66efce4b76
SHA173fc6f8d8ffca42c314911bdfd8e01480c558608
SHA25688258e9da65a57689be4fec2302153f42287001c9ecf3b7b0fbde6b4b67dae64
SHA512ed1a7ef7b60b93cdda777eb1d826f2032ce5d6ccb9a50f5308775bff64b91f4aec44515b573c77816c0c6654f39d49197639a55fbc97f482209471130ce3760e