Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2023, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
af70eec37ef796df4212aa5fed8c0b6d.exe
Resource
win10v2004-20231020-en
General
-
Target
af70eec37ef796df4212aa5fed8c0b6d.exe
-
Size
1.2MB
-
MD5
af70eec37ef796df4212aa5fed8c0b6d
-
SHA1
81f86d974208d70e7470b1383dbdb678665bf5ba
-
SHA256
fd0b2a3feaeeb4a337a83b1576f59582d0e626c40a85c414f36e229fa647a7c7
-
SHA512
92971145dedfb9c962b0745dc43bc59422e9bc287bc84fcacf099550a656b0e30f1d6287a9bc33d530e280f3d6ebacb7ccb8200d2a755f9f10970b61c562809f
-
SSDEEP
24576:iy22PxKKp9xm0gVEUQuYu+eObnQH0NPAK+2FrC9oa0:Jn5KG9xngVEUQu9ySnEm
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1uT15AY2.exe -
Executes dropped EXE 2 IoCs
pid Process 1928 wq4Mu40.exe 2520 1uT15AY2.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" af70eec37ef796df4212aa5fed8c0b6d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" wq4Mu40.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1uT15AY2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4964 schtasks.exe 2000 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4580 wrote to memory of 1928 4580 af70eec37ef796df4212aa5fed8c0b6d.exe 85 PID 4580 wrote to memory of 1928 4580 af70eec37ef796df4212aa5fed8c0b6d.exe 85 PID 4580 wrote to memory of 1928 4580 af70eec37ef796df4212aa5fed8c0b6d.exe 85 PID 1928 wrote to memory of 2520 1928 wq4Mu40.exe 86 PID 1928 wrote to memory of 2520 1928 wq4Mu40.exe 86 PID 1928 wrote to memory of 2520 1928 wq4Mu40.exe 86 PID 2520 wrote to memory of 4964 2520 1uT15AY2.exe 88 PID 2520 wrote to memory of 4964 2520 1uT15AY2.exe 88 PID 2520 wrote to memory of 4964 2520 1uT15AY2.exe 88 PID 2520 wrote to memory of 2000 2520 1uT15AY2.exe 90 PID 2520 wrote to memory of 2000 2520 1uT15AY2.exe 90 PID 2520 wrote to memory of 2000 2520 1uT15AY2.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\af70eec37ef796df4212aa5fed8c0b6d.exe"C:\Users\Admin\AppData\Local\Temp\af70eec37ef796df4212aa5fed8c0b6d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wq4Mu40.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wq4Mu40.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1uT15AY2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1uT15AY2.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:4964
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:2000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51403b63cef25ec4f08c2d9e11afddea7
SHA101207bf3f3efbc52b0a6662df0a64060e0363a53
SHA256e41b7b1fc6e28a75cfe465419140d6f17e97663b93a1bf43c1dd7f7298b1b3f9
SHA5126c989677fe976908f3ea4c337187055a25984ef6f3f7985aa953eb080ea375cdd14c94cd7c377a3f663cd57c936df1a0711818c876dbce7613014856afc236a1
-
Filesize
1.0MB
MD52b7ac2a27b80a65e51ab9b6d408ed1e7
SHA14f67cb5c2372b87eae35ff218ae47915a2510db6
SHA256309bd8c71cbac45869b1dcd3582c1c996a624e0ad59a67415ac9ca0f438723eb
SHA512df7019440bab8769901e9302ec4b3d6b0b73e5d6b898d571900dcf6327114be6963372b0b51ff8ce0addcb32450616fabf4fc2c78719e3584ee25fab9570961d
-
Filesize
1.0MB
MD52b7ac2a27b80a65e51ab9b6d408ed1e7
SHA14f67cb5c2372b87eae35ff218ae47915a2510db6
SHA256309bd8c71cbac45869b1dcd3582c1c996a624e0ad59a67415ac9ca0f438723eb
SHA512df7019440bab8769901e9302ec4b3d6b0b73e5d6b898d571900dcf6327114be6963372b0b51ff8ce0addcb32450616fabf4fc2c78719e3584ee25fab9570961d
-
Filesize
1.3MB
MD51403b63cef25ec4f08c2d9e11afddea7
SHA101207bf3f3efbc52b0a6662df0a64060e0363a53
SHA256e41b7b1fc6e28a75cfe465419140d6f17e97663b93a1bf43c1dd7f7298b1b3f9
SHA5126c989677fe976908f3ea4c337187055a25984ef6f3f7985aa953eb080ea375cdd14c94cd7c377a3f663cd57c936df1a0711818c876dbce7613014856afc236a1
-
Filesize
1.3MB
MD51403b63cef25ec4f08c2d9e11afddea7
SHA101207bf3f3efbc52b0a6662df0a64060e0363a53
SHA256e41b7b1fc6e28a75cfe465419140d6f17e97663b93a1bf43c1dd7f7298b1b3f9
SHA5126c989677fe976908f3ea4c337187055a25984ef6f3f7985aa953eb080ea375cdd14c94cd7c377a3f663cd57c936df1a0711818c876dbce7613014856afc236a1