Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
28/11/2023, 10:55
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231127-en
General
-
Target
file.exe
-
Size
6.5MB
-
MD5
4c6d722386fc028e9813c9434c81840e
-
SHA1
b63b394e5bf0f832ad175186037c4a1eafedd55b
-
SHA256
a763709cacb29bab169bea58709364f138c92fa4fa86bae2bc2524cff4637f50
-
SHA512
730edde4aeadff0b71fb399567abbf90e89a8093489ee0fc9923a14c40fd68bac9a46b74c112e8e779f1cf1ddef96240d1cb24b484a4b187c864560f1d579936
-
SSDEEP
196608:Qft/3UMOoqLlQL+fT3OMdzBiI5Kik1DjEBX1isu:QftP2pQ8DOMdzOxmX1iJ
Malware Config
Extracted
risepro
194.169.175.128
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IEUpdater1.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IEUpdater1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IEUpdater1.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster1.lnk file.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OperaConnect1.lnk file.exe -
Executes dropped EXE 1 IoCs
pid Process 2436 IEUpdater1.exe -
Loads dropped DLL 3 IoCs
pid Process 2428 file.exe 2428 file.exe 2428 file.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2428-0-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/memory/2428-1-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/memory/2428-12-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/memory/2428-15-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/memory/2428-19-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/memory/2428-23-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/memory/2428-24-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/files/0x0008000000018b67-28.dat themida behavioral1/files/0x00080000000192c9-31.dat themida behavioral1/memory/2428-33-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/memory/2428-69-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/memory/2428-73-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/memory/2428-119-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/files/0x00160000000193bd-130.dat themida behavioral1/files/0x00040000000193ed-137.dat themida behavioral1/files/0x00040000000193ed-140.dat themida behavioral1/memory/2428-141-0x0000000004FC0000-0x00000000061F3000-memory.dmp themida behavioral1/memory/2436-143-0x0000000000260000-0x0000000001493000-memory.dmp themida behavioral1/memory/2436-142-0x0000000000260000-0x0000000001493000-memory.dmp themida behavioral1/memory/2436-163-0x0000000000260000-0x0000000001493000-memory.dmp themida behavioral1/memory/2428-162-0x0000000001000000-0x0000000002233000-memory.dmp themida behavioral1/memory/2436-165-0x0000000000260000-0x0000000001493000-memory.dmp themida behavioral1/memory/2436-174-0x0000000000260000-0x0000000001493000-memory.dmp themida behavioral1/memory/2436-175-0x0000000000260000-0x0000000001493000-memory.dmp themida behavioral1/memory/2436-176-0x0000000000260000-0x0000000001493000-memory.dmp themida behavioral1/files/0x0008000000018727-177.dat themida behavioral1/files/0x0008000000018b67-178.dat themida behavioral1/files/0x00080000000192c9-180.dat themida behavioral1/memory/2436-203-0x0000000000260000-0x0000000001493000-memory.dmp themida behavioral1/memory/2436-206-0x0000000000260000-0x0000000001493000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest1 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest1\\MaxLoonaFest1.exe" file.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\LegalHelper1 = "C:\\Users\\Admin\\AppData\\Local\\LegalHelper1\\LegalHelper1.exe" file.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEUpdater1.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 3 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2428 file.exe 2436 IEUpdater1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1924 schtasks.exe 3044 schtasks.exe 1328 schtasks.exe 1968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2428 file.exe 2428 file.exe 2436 IEUpdater1.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1924 2428 file.exe 28 PID 2428 wrote to memory of 1924 2428 file.exe 28 PID 2428 wrote to memory of 1924 2428 file.exe 28 PID 2428 wrote to memory of 1924 2428 file.exe 28 PID 2428 wrote to memory of 3044 2428 file.exe 30 PID 2428 wrote to memory of 3044 2428 file.exe 30 PID 2428 wrote to memory of 3044 2428 file.exe 30 PID 2428 wrote to memory of 3044 2428 file.exe 30 PID 2428 wrote to memory of 1328 2428 file.exe 34 PID 2428 wrote to memory of 1328 2428 file.exe 34 PID 2428 wrote to memory of 1328 2428 file.exe 34 PID 2428 wrote to memory of 1328 2428 file.exe 34 PID 2428 wrote to memory of 1968 2428 file.exe 36 PID 2428 wrote to memory of 1968 2428 file.exe 36 PID 2428 wrote to memory of 1968 2428 file.exe 36 PID 2428 wrote to memory of 1968 2428 file.exe 36 PID 2428 wrote to memory of 2436 2428 file.exe 38 PID 2428 wrote to memory of 2436 2428 file.exe 38 PID 2428 wrote to memory of 2436 2428 file.exe 38 PID 2428 wrote to memory of 2436 2428 file.exe 38 PID 2428 wrote to memory of 2436 2428 file.exe 38 PID 2428 wrote to memory of 2436 2428 file.exe 38 PID 2428 wrote to memory of 2436 2428 file.exe 38 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2428 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP1\OfficeTrackerNMP1.exe" /tn "OfficeTrackerNMP1 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:1924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP1\OfficeTrackerNMP1.exe" /tn "OfficeTrackerNMP1 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:3044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\IEUpdater1\IEUpdater1.exe" /tn "IEUpdater1 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:1328
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\IEUpdater1\IEUpdater1.exe" /tn "IEUpdater1 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:1968
-
-
C:\ProgramData\IEUpdater1\IEUpdater1.exe"C:\ProgramData\IEUpdater1\IEUpdater1.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.5MB
MD54c6d722386fc028e9813c9434c81840e
SHA1b63b394e5bf0f832ad175186037c4a1eafedd55b
SHA256a763709cacb29bab169bea58709364f138c92fa4fa86bae2bc2524cff4637f50
SHA512730edde4aeadff0b71fb399567abbf90e89a8093489ee0fc9923a14c40fd68bac9a46b74c112e8e779f1cf1ddef96240d1cb24b484a4b187c864560f1d579936
-
Filesize
6.5MB
MD54c6d722386fc028e9813c9434c81840e
SHA1b63b394e5bf0f832ad175186037c4a1eafedd55b
SHA256a763709cacb29bab169bea58709364f138c92fa4fa86bae2bc2524cff4637f50
SHA512730edde4aeadff0b71fb399567abbf90e89a8093489ee0fc9923a14c40fd68bac9a46b74c112e8e779f1cf1ddef96240d1cb24b484a4b187c864560f1d579936
-
Filesize
6.5MB
MD54c6d722386fc028e9813c9434c81840e
SHA1b63b394e5bf0f832ad175186037c4a1eafedd55b
SHA256a763709cacb29bab169bea58709364f138c92fa4fa86bae2bc2524cff4637f50
SHA512730edde4aeadff0b71fb399567abbf90e89a8093489ee0fc9923a14c40fd68bac9a46b74c112e8e779f1cf1ddef96240d1cb24b484a4b187c864560f1d579936
-
Filesize
6.5MB
MD54c6d722386fc028e9813c9434c81840e
SHA1b63b394e5bf0f832ad175186037c4a1eafedd55b
SHA256a763709cacb29bab169bea58709364f138c92fa4fa86bae2bc2524cff4637f50
SHA512730edde4aeadff0b71fb399567abbf90e89a8093489ee0fc9923a14c40fd68bac9a46b74c112e8e779f1cf1ddef96240d1cb24b484a4b187c864560f1d579936
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
6.5MB
MD54c6d722386fc028e9813c9434c81840e
SHA1b63b394e5bf0f832ad175186037c4a1eafedd55b
SHA256a763709cacb29bab169bea58709364f138c92fa4fa86bae2bc2524cff4637f50
SHA512730edde4aeadff0b71fb399567abbf90e89a8093489ee0fc9923a14c40fd68bac9a46b74c112e8e779f1cf1ddef96240d1cb24b484a4b187c864560f1d579936
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
3KB
MD5e3b0ad1e4146e0d982bbc1037a6efbbd
SHA1f9369e34d43674ab152d8705a5846f36ec720a67
SHA256681c61ebced11f40cb47e6ba07a52850ffd1fcf45d552b424cd54ff308ae6b79
SHA51261eaca384f73118e702aec0d01792c9c15a3496dc1c94a63f365bf34c0cd8c48e5dcfccb8f5470ee7a666961cfedacbec4c339109363d763552ad7fb26d163fa
-
Filesize
13B
MD52064c3b538efa70d9ec749dbc535267b
SHA12ef104eec5022ea7955a974010de8bb879bf2066
SHA256c2d25871974f232a1a558f21ec6cba9063099014a02e9b1ca17782e753a86e84
SHA512465d56b6dcb8eb3b0d38e2abd16e63ece8c0479da8ad4645cc29d75d73bd785510f9193ee64d325292387870d88a6e2b94b5ef268fead9785dce1900932c687b
-
Filesize
1KB
MD51ce8bb8c832d4a02505aa9c84ebd21e1
SHA10f1e52f68db43cf9b4cab81756d9a09aa3a9cfaf
SHA25602f3914a0c1eb01ff381d3c69a2e0c189c292e568ea1dfde198662bac8fd678d
SHA512258b032452c7d0938b234407e7072d9ababaa42f247853bdf8746e93515e3fe1543630c619eb868c3a67d4c996c2bf74638f31ead016f244cebaa0ddf01f48a7
-
Filesize
6.5MB
MD54c6d722386fc028e9813c9434c81840e
SHA1b63b394e5bf0f832ad175186037c4a1eafedd55b
SHA256a763709cacb29bab169bea58709364f138c92fa4fa86bae2bc2524cff4637f50
SHA512730edde4aeadff0b71fb399567abbf90e89a8093489ee0fc9923a14c40fd68bac9a46b74c112e8e779f1cf1ddef96240d1cb24b484a4b187c864560f1d579936
-
Filesize
6.5MB
MD54c6d722386fc028e9813c9434c81840e
SHA1b63b394e5bf0f832ad175186037c4a1eafedd55b
SHA256a763709cacb29bab169bea58709364f138c92fa4fa86bae2bc2524cff4637f50
SHA512730edde4aeadff0b71fb399567abbf90e89a8093489ee0fc9923a14c40fd68bac9a46b74c112e8e779f1cf1ddef96240d1cb24b484a4b187c864560f1d579936
-
Filesize
6.5MB
MD54c6d722386fc028e9813c9434c81840e
SHA1b63b394e5bf0f832ad175186037c4a1eafedd55b
SHA256a763709cacb29bab169bea58709364f138c92fa4fa86bae2bc2524cff4637f50
SHA512730edde4aeadff0b71fb399567abbf90e89a8093489ee0fc9923a14c40fd68bac9a46b74c112e8e779f1cf1ddef96240d1cb24b484a4b187c864560f1d579936