Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
27/11/2023, 08:14
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231020-en
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
e6602ca6ff091e6bc457402ab1a725e0
-
SHA1
a854e9bc1e34c1a2298eabb3fdd0cf39a4618526
-
SHA256
84b8a4deb85ba2acea4fdd2d1806d6ae0b3af24a7e54ad7acf3dd78ab76576bc
-
SHA512
fe9b7de5a1fa5d3609cc95423457948f6e7c54ecb5d084aa6fe9498eac30152577fa87a5dc9ac1918cfe0283ae50ce3a5002069da47cbd682c57ac097a925742
-
SSDEEP
24576:2opGDjnvrPpkjos0OtjcFc5kM49dj+IuxWQOIjuJuVvhbqL0HtFcgekRP9dT0WNI:OnvrPGT0Egyudc4tI3bqL0NFchaP9dTy
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk file.exe -
Loads dropped DLL 1 IoCs
pid Process 2404 file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2692 schtasks.exe 2612 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2692 2404 file.exe 28 PID 2404 wrote to memory of 2692 2404 file.exe 28 PID 2404 wrote to memory of 2692 2404 file.exe 28 PID 2404 wrote to memory of 2692 2404 file.exe 28 PID 2404 wrote to memory of 2612 2404 file.exe 30 PID 2404 wrote to memory of 2612 2404 file.exe 30 PID 2404 wrote to memory of 2612 2404 file.exe 30 PID 2404 wrote to memory of 2612 2404 file.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5e6602ca6ff091e6bc457402ab1a725e0
SHA1a854e9bc1e34c1a2298eabb3fdd0cf39a4618526
SHA25684b8a4deb85ba2acea4fdd2d1806d6ae0b3af24a7e54ad7acf3dd78ab76576bc
SHA512fe9b7de5a1fa5d3609cc95423457948f6e7c54ecb5d084aa6fe9498eac30152577fa87a5dc9ac1918cfe0283ae50ce3a5002069da47cbd682c57ac097a925742
-
Filesize
1.5MB
MD5e6602ca6ff091e6bc457402ab1a725e0
SHA1a854e9bc1e34c1a2298eabb3fdd0cf39a4618526
SHA25684b8a4deb85ba2acea4fdd2d1806d6ae0b3af24a7e54ad7acf3dd78ab76576bc
SHA512fe9b7de5a1fa5d3609cc95423457948f6e7c54ecb5d084aa6fe9498eac30152577fa87a5dc9ac1918cfe0283ae50ce3a5002069da47cbd682c57ac097a925742