Analysis

  • max time kernel
    129s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/11/2023, 18:11

General

  • Target

    bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe

  • Size

    1.9MB

  • MD5

    d4ea54942ea5c03539b7dc3097086832

  • SHA1

    a4d869ed962be4bfee1f069050ab25e12d6c3e70

  • SHA256

    bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc

  • SHA512

    e1e16636bb57911705df2cd788aa5382309b70ed2c542af589ad75b66a0f8e70c56f1ebe472a1ba26fb9c29df47eef071f9200beb9be869f77804e1bb1c62d00

  • SSDEEP

    24576:iysdTtSLLQBvJJ626LaiUJPvyt53+YzhyeV0x0db9hKFSh/EMxlQQvn+F1N1A2VR:JsdTYLL6GZyyz3jzh3a0pQS2slQYA

Malware Config

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe
    "C:\Users\Admin\AppData\Local\Temp\bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qc4ad12.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qc4ad12.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fl3wf44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fl3wf44.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tI1Za55.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tI1Za55.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1260
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1iF99qw6.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1iF99qw6.exe
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:996
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
              6⤵
              • Creates scheduled task(s)
              PID:4028
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
              6⤵
              • Creates scheduled task(s)
              PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FANBooster131\FANBooster131.exe

    Filesize

    1.5MB

    MD5

    0b8e9207a9f7f901dc486dd4ddc26490

    SHA1

    fb32ff2b8053017897aa6015e659a346240f8d94

    SHA256

    5b58948fc2ff7f6e5f53e09046db8a4801a010d6f73d760461be4865985ac90d

    SHA512

    2fef07fced81573c2d0080566d69947342390e7409ba7b8c8ed57df041c13c699265b31523093ef90b6a9b249f10037775b72137ca25c4cfcd5b80cc056c8a59

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qc4ad12.exe

    Filesize

    1.6MB

    MD5

    4cf4c7ab053347d6748697a7afab3995

    SHA1

    37ecf702c7891d4448af5bd9537fdf7c4dd74ab9

    SHA256

    41b831faca9c36d20b2294afd87e433e9fb4b8ed008021fd3f8c945df34e4806

    SHA512

    ef344ea4e1d076a6c3d34cf9747e267c1f68c3e74ed153b3915d16dd8580b6b467d13746bc3014d30c253391952856fb0f79f4cb6f5b370329ed9ead057389ff

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qc4ad12.exe

    Filesize

    1.6MB

    MD5

    4cf4c7ab053347d6748697a7afab3995

    SHA1

    37ecf702c7891d4448af5bd9537fdf7c4dd74ab9

    SHA256

    41b831faca9c36d20b2294afd87e433e9fb4b8ed008021fd3f8c945df34e4806

    SHA512

    ef344ea4e1d076a6c3d34cf9747e267c1f68c3e74ed153b3915d16dd8580b6b467d13746bc3014d30c253391952856fb0f79f4cb6f5b370329ed9ead057389ff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fl3wf44.exe

    Filesize

    1.1MB

    MD5

    20d3cca4aeb6a86752c843db7fa619ed

    SHA1

    b05871ee117fce0373f7f07e6388ecd67cb1af82

    SHA256

    63e1916c98f4af0324755ebfad85d16025a71b59f573060ac95c5fbeb596ffb3

    SHA512

    bed22e33d4adca922fae94e8243c2bd051a03af8d2a4dd90c75ad09af6612aca124f942bd55364661acdc54f0132a74c802c467933a2cc881492c994d5431244

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fl3wf44.exe

    Filesize

    1.1MB

    MD5

    20d3cca4aeb6a86752c843db7fa619ed

    SHA1

    b05871ee117fce0373f7f07e6388ecd67cb1af82

    SHA256

    63e1916c98f4af0324755ebfad85d16025a71b59f573060ac95c5fbeb596ffb3

    SHA512

    bed22e33d4adca922fae94e8243c2bd051a03af8d2a4dd90c75ad09af6612aca124f942bd55364661acdc54f0132a74c802c467933a2cc881492c994d5431244

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tI1Za55.exe

    Filesize

    1006KB

    MD5

    41e596cf5bb52dcd29bfea184ff92122

    SHA1

    3944d60f56ecf15d3d470a2c22c7005788f81088

    SHA256

    06c257a93f08769d3afdf68ab0ee7fbbc3d99e56ce18d312d530d70d37d61018

    SHA512

    ae51553731815ff17bd824e673d810c3d769196ef46b62d9e7ed7b4deabaa543756009188a3f19e35ae11f0a1776692450706719b7f7f656e117b7fb8264db98

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tI1Za55.exe

    Filesize

    1006KB

    MD5

    41e596cf5bb52dcd29bfea184ff92122

    SHA1

    3944d60f56ecf15d3d470a2c22c7005788f81088

    SHA256

    06c257a93f08769d3afdf68ab0ee7fbbc3d99e56ce18d312d530d70d37d61018

    SHA512

    ae51553731815ff17bd824e673d810c3d769196ef46b62d9e7ed7b4deabaa543756009188a3f19e35ae11f0a1776692450706719b7f7f656e117b7fb8264db98

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1iF99qw6.exe

    Filesize

    1.5MB

    MD5

    0b8e9207a9f7f901dc486dd4ddc26490

    SHA1

    fb32ff2b8053017897aa6015e659a346240f8d94

    SHA256

    5b58948fc2ff7f6e5f53e09046db8a4801a010d6f73d760461be4865985ac90d

    SHA512

    2fef07fced81573c2d0080566d69947342390e7409ba7b8c8ed57df041c13c699265b31523093ef90b6a9b249f10037775b72137ca25c4cfcd5b80cc056c8a59

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1iF99qw6.exe

    Filesize

    1.5MB

    MD5

    0b8e9207a9f7f901dc486dd4ddc26490

    SHA1

    fb32ff2b8053017897aa6015e659a346240f8d94

    SHA256

    5b58948fc2ff7f6e5f53e09046db8a4801a010d6f73d760461be4865985ac90d

    SHA512

    2fef07fced81573c2d0080566d69947342390e7409ba7b8c8ed57df041c13c699265b31523093ef90b6a9b249f10037775b72137ca25c4cfcd5b80cc056c8a59