Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2023, 15:57

General

  • Target

    af70eec37ef796df4212aa5fed8c0b6d.exe

  • Size

    1.2MB

  • MD5

    af70eec37ef796df4212aa5fed8c0b6d

  • SHA1

    81f86d974208d70e7470b1383dbdb678665bf5ba

  • SHA256

    fd0b2a3feaeeb4a337a83b1576f59582d0e626c40a85c414f36e229fa647a7c7

  • SHA512

    92971145dedfb9c962b0745dc43bc59422e9bc287bc84fcacf099550a656b0e30f1d6287a9bc33d530e280f3d6ebacb7ccb8200d2a755f9f10970b61c562809f

  • SSDEEP

    24576:iy22PxKKp9xm0gVEUQuYu+eObnQH0NPAK+2FrC9oa0:Jn5KG9xngVEUQu9ySnEm

Malware Config

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af70eec37ef796df4212aa5fed8c0b6d.exe
    "C:\Users\Admin\AppData\Local\Temp\af70eec37ef796df4212aa5fed8c0b6d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wq4Mu40.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wq4Mu40.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1uT15AY2.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1uT15AY2.exe
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
          4⤵
          • Creates scheduled task(s)
          PID:4964
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
          4⤵
          • Creates scheduled task(s)
          PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FANBooster131\FANBooster131.exe

    Filesize

    1.3MB

    MD5

    1403b63cef25ec4f08c2d9e11afddea7

    SHA1

    01207bf3f3efbc52b0a6662df0a64060e0363a53

    SHA256

    e41b7b1fc6e28a75cfe465419140d6f17e97663b93a1bf43c1dd7f7298b1b3f9

    SHA512

    6c989677fe976908f3ea4c337187055a25984ef6f3f7985aa953eb080ea375cdd14c94cd7c377a3f663cd57c936df1a0711818c876dbce7613014856afc236a1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wq4Mu40.exe

    Filesize

    1.0MB

    MD5

    2b7ac2a27b80a65e51ab9b6d408ed1e7

    SHA1

    4f67cb5c2372b87eae35ff218ae47915a2510db6

    SHA256

    309bd8c71cbac45869b1dcd3582c1c996a624e0ad59a67415ac9ca0f438723eb

    SHA512

    df7019440bab8769901e9302ec4b3d6b0b73e5d6b898d571900dcf6327114be6963372b0b51ff8ce0addcb32450616fabf4fc2c78719e3584ee25fab9570961d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wq4Mu40.exe

    Filesize

    1.0MB

    MD5

    2b7ac2a27b80a65e51ab9b6d408ed1e7

    SHA1

    4f67cb5c2372b87eae35ff218ae47915a2510db6

    SHA256

    309bd8c71cbac45869b1dcd3582c1c996a624e0ad59a67415ac9ca0f438723eb

    SHA512

    df7019440bab8769901e9302ec4b3d6b0b73e5d6b898d571900dcf6327114be6963372b0b51ff8ce0addcb32450616fabf4fc2c78719e3584ee25fab9570961d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1uT15AY2.exe

    Filesize

    1.3MB

    MD5

    1403b63cef25ec4f08c2d9e11afddea7

    SHA1

    01207bf3f3efbc52b0a6662df0a64060e0363a53

    SHA256

    e41b7b1fc6e28a75cfe465419140d6f17e97663b93a1bf43c1dd7f7298b1b3f9

    SHA512

    6c989677fe976908f3ea4c337187055a25984ef6f3f7985aa953eb080ea375cdd14c94cd7c377a3f663cd57c936df1a0711818c876dbce7613014856afc236a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1uT15AY2.exe

    Filesize

    1.3MB

    MD5

    1403b63cef25ec4f08c2d9e11afddea7

    SHA1

    01207bf3f3efbc52b0a6662df0a64060e0363a53

    SHA256

    e41b7b1fc6e28a75cfe465419140d6f17e97663b93a1bf43c1dd7f7298b1b3f9

    SHA512

    6c989677fe976908f3ea4c337187055a25984ef6f3f7985aa953eb080ea375cdd14c94cd7c377a3f663cd57c936df1a0711818c876dbce7613014856afc236a1