Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2023, 03:35

General

  • Target

    84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe

  • Size

    1.7MB

  • MD5

    f2aa0cbf3dd375f4f7fb134c2d45124a

  • SHA1

    c24619d98c2aaf86e0f57a2b32b52c4a87b50333

  • SHA256

    84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41

  • SHA512

    32cc53feb4f91b9bf5dc16b17f46765593ce2f06c16cf7f0b54ee79f56a5c97933d0b565ce0208baf8416cdc5351e1da3dbfcbe548b51fb5c8c0917d1fc42e6e

  • SSDEEP

    49152:rf7YF7FKURLolUyatveFB8sxFEIWcCXg2F:vYF7FKqcj13

Malware Config

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe
    "C:\Users\Admin\AppData\Local\Temp\84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3472
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uj1ic29.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uj1ic29.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Li2ck25.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Li2ck25.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1036
  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ow67vL1.exe
    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ow67vL1.exe
    1⤵
    • Drops startup file
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:2316
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:5040
  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Di5Wt56.exe
    C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Di5Wt56.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FANBooster131\FANBooster131.exe

    Filesize

    1.5MB

    MD5

    2f10a69bac962ab7565b578c5718c797

    SHA1

    d288cca4923a35173fba3a5f0590901c92935d05

    SHA256

    ed79154c581284c5e0ded734623489b1bd992a2c123851889136421c465c513b

    SHA512

    4b7caaba3b1d2e984b9e13a2f6f8aa0f72be94c1cd9f0834e6c177d7b9adf3fddb3155b048928c3a7be52c95c6d63b497ba695aea68540f7158818d538f3b73b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uj1ic29.exe

    Filesize

    1.5MB

    MD5

    78d42d8773490ee35a6cd4458ec03518

    SHA1

    e8a8da6cd382660d9e32b0ce1638783953782929

    SHA256

    f9fb5b8ee46383b255cddaa7bebe20258356d981cfaf4ffad317033421e21c39

    SHA512

    189613a8589938ed4255824e17518ae0ff4e9044ab4de82ca5a1b137542915b30a8b40de080f3e0901d5d6daf34d3d00659e9c305d5f71cd37e411651fbc0be2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uj1ic29.exe

    Filesize

    1.5MB

    MD5

    78d42d8773490ee35a6cd4458ec03518

    SHA1

    e8a8da6cd382660d9e32b0ce1638783953782929

    SHA256

    f9fb5b8ee46383b255cddaa7bebe20258356d981cfaf4ffad317033421e21c39

    SHA512

    189613a8589938ed4255824e17518ae0ff4e9044ab4de82ca5a1b137542915b30a8b40de080f3e0901d5d6daf34d3d00659e9c305d5f71cd37e411651fbc0be2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Li2ck25.exe

    Filesize

    1011KB

    MD5

    37ec060370857d016cefeff9dffe825c

    SHA1

    1d0cd8a852572f19fe45fb55d21a3bcdf2e879ab

    SHA256

    d79a9ef5ed2dd110c211397cd343b1ca3bb3f73081a9490c5967cbf48fec5888

    SHA512

    a5bf533fb74798b179f7c3b271982a2c976567eead5b697abc4685d8471ee1805d3d1ccb6d07e7347ccaf4f7186146b2e822287e049617f42101a7acc98ae6b5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Li2ck25.exe

    Filesize

    1011KB

    MD5

    37ec060370857d016cefeff9dffe825c

    SHA1

    1d0cd8a852572f19fe45fb55d21a3bcdf2e879ab

    SHA256

    d79a9ef5ed2dd110c211397cd343b1ca3bb3f73081a9490c5967cbf48fec5888

    SHA512

    a5bf533fb74798b179f7c3b271982a2c976567eead5b697abc4685d8471ee1805d3d1ccb6d07e7347ccaf4f7186146b2e822287e049617f42101a7acc98ae6b5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Di5Wt56.exe

    Filesize

    888KB

    MD5

    8a69a2613e34e975f85f7fc8523bf9cd

    SHA1

    eebee02b1110450dba7ae2f8021cfc126fdb6ded

    SHA256

    caddaeeb1c6f428dedbf724ea618ca68df46f352a6de39d695f14a36e19cfbf0

    SHA512

    5df03efb13ab9533a7f9843ec51d256ae9297da901cef217088b4374c5f14ffaf7e11abddf14218c0619887f080df9b5918f8eb9ccd7aa8bf632724de4e14f63

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Di5Wt56.exe

    Filesize

    888KB

    MD5

    8a69a2613e34e975f85f7fc8523bf9cd

    SHA1

    eebee02b1110450dba7ae2f8021cfc126fdb6ded

    SHA256

    caddaeeb1c6f428dedbf724ea618ca68df46f352a6de39d695f14a36e19cfbf0

    SHA512

    5df03efb13ab9533a7f9843ec51d256ae9297da901cef217088b4374c5f14ffaf7e11abddf14218c0619887f080df9b5918f8eb9ccd7aa8bf632724de4e14f63

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ow67vL1.exe

    Filesize

    1.5MB

    MD5

    2f10a69bac962ab7565b578c5718c797

    SHA1

    d288cca4923a35173fba3a5f0590901c92935d05

    SHA256

    ed79154c581284c5e0ded734623489b1bd992a2c123851889136421c465c513b

    SHA512

    4b7caaba3b1d2e984b9e13a2f6f8aa0f72be94c1cd9f0834e6c177d7b9adf3fddb3155b048928c3a7be52c95c6d63b497ba695aea68540f7158818d538f3b73b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ow67vL1.exe

    Filesize

    1.5MB

    MD5

    2f10a69bac962ab7565b578c5718c797

    SHA1

    d288cca4923a35173fba3a5f0590901c92935d05

    SHA256

    ed79154c581284c5e0ded734623489b1bd992a2c123851889136421c465c513b

    SHA512

    4b7caaba3b1d2e984b9e13a2f6f8aa0f72be94c1cd9f0834e6c177d7b9adf3fddb3155b048928c3a7be52c95c6d63b497ba695aea68540f7158818d538f3b73b