Analysis
-
max time kernel
129s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
23/11/2023, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe
Resource
win10-20231020-en
General
-
Target
bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe
-
Size
1.9MB
-
MD5
d4ea54942ea5c03539b7dc3097086832
-
SHA1
a4d869ed962be4bfee1f069050ab25e12d6c3e70
-
SHA256
bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc
-
SHA512
e1e16636bb57911705df2cd788aa5382309b70ed2c542af589ad75b66a0f8e70c56f1ebe472a1ba26fb9c29df47eef071f9200beb9be869f77804e1bb1c62d00
-
SSDEEP
24576:iysdTtSLLQBvJJ626LaiUJPvyt53+YzhyeV0x0db9hKFSh/EMxlQQvn+F1N1A2VR:JsdTYLL6GZyyz3jzh3a0pQS2slQYA
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1iF99qw6.exe -
Executes dropped EXE 4 IoCs
pid Process 1544 Qc4ad12.exe 1568 Fl3wf44.exe 1260 tI1Za55.exe 996 1iF99qw6.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" tI1Za55.exe Set value (str) \REGISTRY\USER\S-1-5-21-2508097367-364665605-1201309312-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1iF99qw6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Qc4ad12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Fl3wf44.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4028 schtasks.exe 1960 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3080 wrote to memory of 1544 3080 bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe 71 PID 3080 wrote to memory of 1544 3080 bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe 71 PID 3080 wrote to memory of 1544 3080 bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe 71 PID 1544 wrote to memory of 1568 1544 Qc4ad12.exe 72 PID 1544 wrote to memory of 1568 1544 Qc4ad12.exe 72 PID 1544 wrote to memory of 1568 1544 Qc4ad12.exe 72 PID 1568 wrote to memory of 1260 1568 Fl3wf44.exe 73 PID 1568 wrote to memory of 1260 1568 Fl3wf44.exe 73 PID 1568 wrote to memory of 1260 1568 Fl3wf44.exe 73 PID 1260 wrote to memory of 996 1260 tI1Za55.exe 74 PID 1260 wrote to memory of 996 1260 tI1Za55.exe 74 PID 1260 wrote to memory of 996 1260 tI1Za55.exe 74 PID 996 wrote to memory of 4028 996 1iF99qw6.exe 75 PID 996 wrote to memory of 4028 996 1iF99qw6.exe 75 PID 996 wrote to memory of 4028 996 1iF99qw6.exe 75 PID 996 wrote to memory of 1960 996 1iF99qw6.exe 77 PID 996 wrote to memory of 1960 996 1iF99qw6.exe 77 PID 996 wrote to memory of 1960 996 1iF99qw6.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe"C:\Users\Admin\AppData\Local\Temp\bdbe4b8dab45f42307222a2d287ec743feaeabb676a2e8e11006101bcb8372cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qc4ad12.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qc4ad12.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fl3wf44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fl3wf44.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tI1Za55.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tI1Za55.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1iF99qw6.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1iF99qw6.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:4028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:1960
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD50b8e9207a9f7f901dc486dd4ddc26490
SHA1fb32ff2b8053017897aa6015e659a346240f8d94
SHA2565b58948fc2ff7f6e5f53e09046db8a4801a010d6f73d760461be4865985ac90d
SHA5122fef07fced81573c2d0080566d69947342390e7409ba7b8c8ed57df041c13c699265b31523093ef90b6a9b249f10037775b72137ca25c4cfcd5b80cc056c8a59
-
Filesize
1.6MB
MD54cf4c7ab053347d6748697a7afab3995
SHA137ecf702c7891d4448af5bd9537fdf7c4dd74ab9
SHA25641b831faca9c36d20b2294afd87e433e9fb4b8ed008021fd3f8c945df34e4806
SHA512ef344ea4e1d076a6c3d34cf9747e267c1f68c3e74ed153b3915d16dd8580b6b467d13746bc3014d30c253391952856fb0f79f4cb6f5b370329ed9ead057389ff
-
Filesize
1.6MB
MD54cf4c7ab053347d6748697a7afab3995
SHA137ecf702c7891d4448af5bd9537fdf7c4dd74ab9
SHA25641b831faca9c36d20b2294afd87e433e9fb4b8ed008021fd3f8c945df34e4806
SHA512ef344ea4e1d076a6c3d34cf9747e267c1f68c3e74ed153b3915d16dd8580b6b467d13746bc3014d30c253391952856fb0f79f4cb6f5b370329ed9ead057389ff
-
Filesize
1.1MB
MD520d3cca4aeb6a86752c843db7fa619ed
SHA1b05871ee117fce0373f7f07e6388ecd67cb1af82
SHA25663e1916c98f4af0324755ebfad85d16025a71b59f573060ac95c5fbeb596ffb3
SHA512bed22e33d4adca922fae94e8243c2bd051a03af8d2a4dd90c75ad09af6612aca124f942bd55364661acdc54f0132a74c802c467933a2cc881492c994d5431244
-
Filesize
1.1MB
MD520d3cca4aeb6a86752c843db7fa619ed
SHA1b05871ee117fce0373f7f07e6388ecd67cb1af82
SHA25663e1916c98f4af0324755ebfad85d16025a71b59f573060ac95c5fbeb596ffb3
SHA512bed22e33d4adca922fae94e8243c2bd051a03af8d2a4dd90c75ad09af6612aca124f942bd55364661acdc54f0132a74c802c467933a2cc881492c994d5431244
-
Filesize
1006KB
MD541e596cf5bb52dcd29bfea184ff92122
SHA13944d60f56ecf15d3d470a2c22c7005788f81088
SHA25606c257a93f08769d3afdf68ab0ee7fbbc3d99e56ce18d312d530d70d37d61018
SHA512ae51553731815ff17bd824e673d810c3d769196ef46b62d9e7ed7b4deabaa543756009188a3f19e35ae11f0a1776692450706719b7f7f656e117b7fb8264db98
-
Filesize
1006KB
MD541e596cf5bb52dcd29bfea184ff92122
SHA13944d60f56ecf15d3d470a2c22c7005788f81088
SHA25606c257a93f08769d3afdf68ab0ee7fbbc3d99e56ce18d312d530d70d37d61018
SHA512ae51553731815ff17bd824e673d810c3d769196ef46b62d9e7ed7b4deabaa543756009188a3f19e35ae11f0a1776692450706719b7f7f656e117b7fb8264db98
-
Filesize
1.5MB
MD50b8e9207a9f7f901dc486dd4ddc26490
SHA1fb32ff2b8053017897aa6015e659a346240f8d94
SHA2565b58948fc2ff7f6e5f53e09046db8a4801a010d6f73d760461be4865985ac90d
SHA5122fef07fced81573c2d0080566d69947342390e7409ba7b8c8ed57df041c13c699265b31523093ef90b6a9b249f10037775b72137ca25c4cfcd5b80cc056c8a59
-
Filesize
1.5MB
MD50b8e9207a9f7f901dc486dd4ddc26490
SHA1fb32ff2b8053017897aa6015e659a346240f8d94
SHA2565b58948fc2ff7f6e5f53e09046db8a4801a010d6f73d760461be4865985ac90d
SHA5122fef07fced81573c2d0080566d69947342390e7409ba7b8c8ed57df041c13c699265b31523093ef90b6a9b249f10037775b72137ca25c4cfcd5b80cc056c8a59