Analysis

  • max time kernel
    137s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2023, 16:11

General

  • Target

    6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe

  • Size

    1.9MB

  • MD5

    ef0108fafae2993a2afaf507b547a4f9

  • SHA1

    efdc9cca39d039576c0b1328d6fa7359886f1641

  • SHA256

    6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee

  • SHA512

    73bc0276d46fe696697014cdbe3254651f0c7a4c073ca544a28d4b6a7c14915caa2e1a10af19b11cb2af34b590dbb894928865018d9bd6b1c33973f9aabf2983

  • SSDEEP

    24576:hyaV+F2BKb+qiUpuz4BA6LCGjpRMsXJ9a+Vv18DAbg7dmNxZk18WJNQ:UUBgbsj4K6TX/9F87dmNxZ9W

Malware Config

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe
    "C:\Users\Admin\AppData\Local\Temp\6587e6e9179ddd05c66baecc90262d9cc41807946f53a04c39efef30b74903ee.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PP2mc19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PP2mc19.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iz2bR50.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iz2bR50.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3692
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ7kk17.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ7kk17.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kx39hx6.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kx39hx6.exe
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2784
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
              6⤵
              • Creates scheduled task(s)
              PID:2808
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
              6⤵
              • Creates scheduled task(s)
              PID:1908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FANBooster131\FANBooster131.exe

    Filesize

    1.5MB

    MD5

    4d92ab1ff6d2b3b7fe450f66efce4b76

    SHA1

    73fc6f8d8ffca42c314911bdfd8e01480c558608

    SHA256

    88258e9da65a57689be4fec2302153f42287001c9ecf3b7b0fbde6b4b67dae64

    SHA512

    ed1a7ef7b60b93cdda777eb1d826f2032ce5d6ccb9a50f5308775bff64b91f4aec44515b573c77816c0c6654f39d49197639a55fbc97f482209471130ce3760e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PP2mc19.exe

    Filesize

    1.6MB

    MD5

    67493eabdb187b3a0bc9806d281dbcdb

    SHA1

    fa77b287321f5ebf346d88248ece652fe4991b17

    SHA256

    43fcf5962ad5eeb11373ae0c373622ec84a9d75db29af9cebda1efd666c20646

    SHA512

    a0d7fd9435e8a1d42c25b7c30314d5c444594fe24d6a9a69c258ef0ad253741a5277a690c8a2fb363a9e701eb254db62c7eef17b7286049b67ff081eccb74841

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PP2mc19.exe

    Filesize

    1.6MB

    MD5

    67493eabdb187b3a0bc9806d281dbcdb

    SHA1

    fa77b287321f5ebf346d88248ece652fe4991b17

    SHA256

    43fcf5962ad5eeb11373ae0c373622ec84a9d75db29af9cebda1efd666c20646

    SHA512

    a0d7fd9435e8a1d42c25b7c30314d5c444594fe24d6a9a69c258ef0ad253741a5277a690c8a2fb363a9e701eb254db62c7eef17b7286049b67ff081eccb74841

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iz2bR50.exe

    Filesize

    1.1MB

    MD5

    3e59b61545307b4965551328393d33b0

    SHA1

    b6b0f74594635cf2359f1b0809b5d279133b20d8

    SHA256

    4bbf574ff581675b9a1b38c3a0847c45e3d432e37f4f786b0631e97e5b1e68e5

    SHA512

    ed09de55fec9c870cb3a69fbaefffe4ed2501505f0de37a11055033b22af23b0b8f28fe60e480250a7669de400c149fbca70efa3a41c50e5968c73909b80b0a7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iz2bR50.exe

    Filesize

    1.1MB

    MD5

    3e59b61545307b4965551328393d33b0

    SHA1

    b6b0f74594635cf2359f1b0809b5d279133b20d8

    SHA256

    4bbf574ff581675b9a1b38c3a0847c45e3d432e37f4f786b0631e97e5b1e68e5

    SHA512

    ed09de55fec9c870cb3a69fbaefffe4ed2501505f0de37a11055033b22af23b0b8f28fe60e480250a7669de400c149fbca70efa3a41c50e5968c73909b80b0a7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ7kk17.exe

    Filesize

    1006KB

    MD5

    746e3fba274c75ec5053f72f0ce644b2

    SHA1

    7052c5f4ff04176140dacb4e5ee145de153c6e36

    SHA256

    31c5e5a7c52e6946abc7a4b321e273a8436ba86277c15be44c07e12f3905c4dc

    SHA512

    dd9184dbf1bc02ef42607115fbfcd1d3464cb992dcfc18484d36033ebb2ad33c48ec06c4f820530ed14226d4815921851759623e4dd7677905bc60d5072de7ec

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ7kk17.exe

    Filesize

    1006KB

    MD5

    746e3fba274c75ec5053f72f0ce644b2

    SHA1

    7052c5f4ff04176140dacb4e5ee145de153c6e36

    SHA256

    31c5e5a7c52e6946abc7a4b321e273a8436ba86277c15be44c07e12f3905c4dc

    SHA512

    dd9184dbf1bc02ef42607115fbfcd1d3464cb992dcfc18484d36033ebb2ad33c48ec06c4f820530ed14226d4815921851759623e4dd7677905bc60d5072de7ec

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kx39hx6.exe

    Filesize

    1.5MB

    MD5

    4d92ab1ff6d2b3b7fe450f66efce4b76

    SHA1

    73fc6f8d8ffca42c314911bdfd8e01480c558608

    SHA256

    88258e9da65a57689be4fec2302153f42287001c9ecf3b7b0fbde6b4b67dae64

    SHA512

    ed1a7ef7b60b93cdda777eb1d826f2032ce5d6ccb9a50f5308775bff64b91f4aec44515b573c77816c0c6654f39d49197639a55fbc97f482209471130ce3760e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kx39hx6.exe

    Filesize

    1.5MB

    MD5

    4d92ab1ff6d2b3b7fe450f66efce4b76

    SHA1

    73fc6f8d8ffca42c314911bdfd8e01480c558608

    SHA256

    88258e9da65a57689be4fec2302153f42287001c9ecf3b7b0fbde6b4b67dae64

    SHA512

    ed1a7ef7b60b93cdda777eb1d826f2032ce5d6ccb9a50f5308775bff64b91f4aec44515b573c77816c0c6654f39d49197639a55fbc97f482209471130ce3760e