Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
27/11/2023, 08:35
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231023-en
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
b76be13bf30e42fc7e434143e3dbe318
-
SHA1
b10269af011e824a9172d7b02277e02e615ea533
-
SHA256
efdb844850c366243506965f2d3e5b6c0b6ec1f01e1f11a8f4a4f69dd0f50e0a
-
SHA512
de6c63bf8b545d2cce7efb3496de2dacae4d72516b699f1808631430679a33e20e7e38f9dc18aa45d63c94e55020be7e3f360ccd6a3c76e68ca248fa6a992c3b
-
SSDEEP
24576:2opGDjnvrPpkjos0OtjcFc5kM49dj+IuxWQOIjuJuVvhbqL0HtFcgekRP9dT0WNI:OnvrPGT0Egyudc4tI3bqL0NFchaP9dTy
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk file.exe -
Loads dropped DLL 1 IoCs
pid Process 2516 file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2316 schtasks.exe 2820 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2316 2516 file.exe 28 PID 2516 wrote to memory of 2316 2516 file.exe 28 PID 2516 wrote to memory of 2316 2516 file.exe 28 PID 2516 wrote to memory of 2316 2516 file.exe 28 PID 2516 wrote to memory of 2820 2516 file.exe 30 PID 2516 wrote to memory of 2820 2516 file.exe 30 PID 2516 wrote to memory of 2820 2516 file.exe 30 PID 2516 wrote to memory of 2820 2516 file.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2316
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5b76be13bf30e42fc7e434143e3dbe318
SHA1b10269af011e824a9172d7b02277e02e615ea533
SHA256efdb844850c366243506965f2d3e5b6c0b6ec1f01e1f11a8f4a4f69dd0f50e0a
SHA512de6c63bf8b545d2cce7efb3496de2dacae4d72516b699f1808631430679a33e20e7e38f9dc18aa45d63c94e55020be7e3f360ccd6a3c76e68ca248fa6a992c3b
-
Filesize
1.5MB
MD5b76be13bf30e42fc7e434143e3dbe318
SHA1b10269af011e824a9172d7b02277e02e615ea533
SHA256efdb844850c366243506965f2d3e5b6c0b6ec1f01e1f11a8f4a4f69dd0f50e0a
SHA512de6c63bf8b545d2cce7efb3496de2dacae4d72516b699f1808631430679a33e20e7e38f9dc18aa45d63c94e55020be7e3f360ccd6a3c76e68ca248fa6a992c3b