Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe
Resource
win10v2004-20231020-en
General
-
Target
84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe
-
Size
1.7MB
-
MD5
f2aa0cbf3dd375f4f7fb134c2d45124a
-
SHA1
c24619d98c2aaf86e0f57a2b32b52c4a87b50333
-
SHA256
84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41
-
SHA512
32cc53feb4f91b9bf5dc16b17f46765593ce2f06c16cf7f0b54ee79f56a5c97933d0b565ce0208baf8416cdc5351e1da3dbfcbe548b51fb5c8c0917d1fc42e6e
-
SSDEEP
49152:rf7YF7FKURLolUyatveFB8sxFEIWcCXg2F:vYF7FKqcj13
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1Ow67vL1.exe -
Executes dropped EXE 4 IoCs
pid Process 724 uj1ic29.exe 1036 Li2ck25.exe 3696 Di5Wt56.exe 4168 1Ow67vL1.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" uj1ic29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Li2ck25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Di5Wt56.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1Ow67vL1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2316 schtasks.exe 5040 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3472 wrote to memory of 724 3472 84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe 37 PID 3472 wrote to memory of 724 3472 84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe 37 PID 3472 wrote to memory of 724 3472 84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe 37 PID 724 wrote to memory of 1036 724 uj1ic29.exe 42 PID 724 wrote to memory of 1036 724 uj1ic29.exe 42 PID 724 wrote to memory of 1036 724 uj1ic29.exe 42 PID 1036 wrote to memory of 3696 1036 Li2ck25.exe 41 PID 1036 wrote to memory of 3696 1036 Li2ck25.exe 41 PID 1036 wrote to memory of 3696 1036 Li2ck25.exe 41 PID 3696 wrote to memory of 4168 3696 Di5Wt56.exe 40 PID 3696 wrote to memory of 4168 3696 Di5Wt56.exe 40 PID 3696 wrote to memory of 4168 3696 Di5Wt56.exe 40 PID 4168 wrote to memory of 2316 4168 1Ow67vL1.exe 55 PID 4168 wrote to memory of 2316 4168 1Ow67vL1.exe 55 PID 4168 wrote to memory of 2316 4168 1Ow67vL1.exe 55 PID 4168 wrote to memory of 5040 4168 1Ow67vL1.exe 60 PID 4168 wrote to memory of 5040 4168 1Ow67vL1.exe 60 PID 4168 wrote to memory of 5040 4168 1Ow67vL1.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe"C:\Users\Admin\AppData\Local\Temp\84acca499f743d707e9ed8de73c3ab128c09b8913aa53d3d5264c03f8975db41.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uj1ic29.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uj1ic29.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Li2ck25.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Li2ck25.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ow67vL1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ow67vL1.exe1⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2316
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Di5Wt56.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Di5Wt56.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD52f10a69bac962ab7565b578c5718c797
SHA1d288cca4923a35173fba3a5f0590901c92935d05
SHA256ed79154c581284c5e0ded734623489b1bd992a2c123851889136421c465c513b
SHA5124b7caaba3b1d2e984b9e13a2f6f8aa0f72be94c1cd9f0834e6c177d7b9adf3fddb3155b048928c3a7be52c95c6d63b497ba695aea68540f7158818d538f3b73b
-
Filesize
1.5MB
MD578d42d8773490ee35a6cd4458ec03518
SHA1e8a8da6cd382660d9e32b0ce1638783953782929
SHA256f9fb5b8ee46383b255cddaa7bebe20258356d981cfaf4ffad317033421e21c39
SHA512189613a8589938ed4255824e17518ae0ff4e9044ab4de82ca5a1b137542915b30a8b40de080f3e0901d5d6daf34d3d00659e9c305d5f71cd37e411651fbc0be2
-
Filesize
1.5MB
MD578d42d8773490ee35a6cd4458ec03518
SHA1e8a8da6cd382660d9e32b0ce1638783953782929
SHA256f9fb5b8ee46383b255cddaa7bebe20258356d981cfaf4ffad317033421e21c39
SHA512189613a8589938ed4255824e17518ae0ff4e9044ab4de82ca5a1b137542915b30a8b40de080f3e0901d5d6daf34d3d00659e9c305d5f71cd37e411651fbc0be2
-
Filesize
1011KB
MD537ec060370857d016cefeff9dffe825c
SHA11d0cd8a852572f19fe45fb55d21a3bcdf2e879ab
SHA256d79a9ef5ed2dd110c211397cd343b1ca3bb3f73081a9490c5967cbf48fec5888
SHA512a5bf533fb74798b179f7c3b271982a2c976567eead5b697abc4685d8471ee1805d3d1ccb6d07e7347ccaf4f7186146b2e822287e049617f42101a7acc98ae6b5
-
Filesize
1011KB
MD537ec060370857d016cefeff9dffe825c
SHA11d0cd8a852572f19fe45fb55d21a3bcdf2e879ab
SHA256d79a9ef5ed2dd110c211397cd343b1ca3bb3f73081a9490c5967cbf48fec5888
SHA512a5bf533fb74798b179f7c3b271982a2c976567eead5b697abc4685d8471ee1805d3d1ccb6d07e7347ccaf4f7186146b2e822287e049617f42101a7acc98ae6b5
-
Filesize
888KB
MD58a69a2613e34e975f85f7fc8523bf9cd
SHA1eebee02b1110450dba7ae2f8021cfc126fdb6ded
SHA256caddaeeb1c6f428dedbf724ea618ca68df46f352a6de39d695f14a36e19cfbf0
SHA5125df03efb13ab9533a7f9843ec51d256ae9297da901cef217088b4374c5f14ffaf7e11abddf14218c0619887f080df9b5918f8eb9ccd7aa8bf632724de4e14f63
-
Filesize
888KB
MD58a69a2613e34e975f85f7fc8523bf9cd
SHA1eebee02b1110450dba7ae2f8021cfc126fdb6ded
SHA256caddaeeb1c6f428dedbf724ea618ca68df46f352a6de39d695f14a36e19cfbf0
SHA5125df03efb13ab9533a7f9843ec51d256ae9297da901cef217088b4374c5f14ffaf7e11abddf14218c0619887f080df9b5918f8eb9ccd7aa8bf632724de4e14f63
-
Filesize
1.5MB
MD52f10a69bac962ab7565b578c5718c797
SHA1d288cca4923a35173fba3a5f0590901c92935d05
SHA256ed79154c581284c5e0ded734623489b1bd992a2c123851889136421c465c513b
SHA5124b7caaba3b1d2e984b9e13a2f6f8aa0f72be94c1cd9f0834e6c177d7b9adf3fddb3155b048928c3a7be52c95c6d63b497ba695aea68540f7158818d538f3b73b
-
Filesize
1.5MB
MD52f10a69bac962ab7565b578c5718c797
SHA1d288cca4923a35173fba3a5f0590901c92935d05
SHA256ed79154c581284c5e0ded734623489b1bd992a2c123851889136421c465c513b
SHA5124b7caaba3b1d2e984b9e13a2f6f8aa0f72be94c1cd9f0834e6c177d7b9adf3fddb3155b048928c3a7be52c95c6d63b497ba695aea68540f7158818d538f3b73b