Analysis

  • max time kernel
    129s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-11-2023 10:43

General

  • Target

    705df2b00d971aed1fe39f237d6f2f5d4d564e781f69045abc9aef51190f1de1.exe

  • Size

    1.9MB

  • MD5

    9b6058c14cdede6456072cdf78308a5c

  • SHA1

    b430e379e58237f14e226644a9308a5d71d4db4d

  • SHA256

    705df2b00d971aed1fe39f237d6f2f5d4d564e781f69045abc9aef51190f1de1

  • SHA512

    3f78a2fc33176fa495cd75b27e3cc32d8ed5aea2fbc72b134624717d57c802a05df1000faade94ca524873700c9302cb1c03a866fc272d6a60a5b9ac77e3053a

  • SSDEEP

    49152:dNZgDov+gc4URhkeCTSOv0Uv5sGuQ+2l8oqJCK:FgDov+if8Uv52dJCK

Malware Config

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\705df2b00d971aed1fe39f237d6f2f5d4d564e781f69045abc9aef51190f1de1.exe
    "C:\Users\Admin\AppData\Local\Temp\705df2b00d971aed1fe39f237d6f2f5d4d564e781f69045abc9aef51190f1de1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qw3BK58.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qw3BK58.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN0bS25.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN0bS25.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Mo1gw81.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Mo1gw81.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3752
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1cO46JX0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1cO46JX0.exe
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
              6⤵
              • Creates scheduled task(s)
              PID:1096
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
              6⤵
              • Creates scheduled task(s)
              PID:4172

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FANBooster131\FANBooster131.exe
    Filesize

    1.5MB

    MD5

    28560fcd62dd388ff5894401eb17b407

    SHA1

    ca7edff60a897dabbd043495b68b62f5f6d767d6

    SHA256

    354bc27f01908c6eba07ed177ceb393abb90a5d42adfda032a5940665c415d55

    SHA512

    6ef3779fd8a45899b206a59aa73f05da0b0beb4fe5768e7e386739cbd4e795751d024f3789a9e3273869e08026ae8b3a304ddad977c0369108429c98bd048397

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qw3BK58.exe
    Filesize

    1.6MB

    MD5

    2f043bd83fe4130b3786ec786696839d

    SHA1

    7d256fbb36232e91240dca79575c36f00dcdbed6

    SHA256

    7d5ff99bfe03e1d8febe2483928bd609c171efe22077d7f03fd612ee2c1c52ba

    SHA512

    87edf6d3c16368086d0fa70cb4a1ed2b31a0c12b43eb67d093638b040034f71fb4746b2b26ab639506fd05237b515b5dd15ba15b9a6b8da9b115ece1eae38c04

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qw3BK58.exe
    Filesize

    1.6MB

    MD5

    2f043bd83fe4130b3786ec786696839d

    SHA1

    7d256fbb36232e91240dca79575c36f00dcdbed6

    SHA256

    7d5ff99bfe03e1d8febe2483928bd609c171efe22077d7f03fd612ee2c1c52ba

    SHA512

    87edf6d3c16368086d0fa70cb4a1ed2b31a0c12b43eb67d093638b040034f71fb4746b2b26ab639506fd05237b515b5dd15ba15b9a6b8da9b115ece1eae38c04

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN0bS25.exe
    Filesize

    1.1MB

    MD5

    91392858714d9700878a5e6c2f7bb498

    SHA1

    e9828e36c41ed77fcd514d4cb2f157650b287818

    SHA256

    cc088ec174a7c09f311f113e6cef8102bbff1713f07e15e0c2fcc8eac6d79938

    SHA512

    46a631b5ca3e311bc2bd649b4ca4511be23343545096c2b8755310e1c08e8916413913812218dd705ee5cf265db42148915f614ac2db150201bc41f4812e0a49

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN0bS25.exe
    Filesize

    1.1MB

    MD5

    91392858714d9700878a5e6c2f7bb498

    SHA1

    e9828e36c41ed77fcd514d4cb2f157650b287818

    SHA256

    cc088ec174a7c09f311f113e6cef8102bbff1713f07e15e0c2fcc8eac6d79938

    SHA512

    46a631b5ca3e311bc2bd649b4ca4511be23343545096c2b8755310e1c08e8916413913812218dd705ee5cf265db42148915f614ac2db150201bc41f4812e0a49

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Mo1gw81.exe
    Filesize

    1005KB

    MD5

    98a8b1cbaf165fe5107675205f957b21

    SHA1

    985b4e5a51c27a40d728b02b7e09d882e0a2998b

    SHA256

    81da921bb0c41b067b1d584846b4deafee41fb21fc1cab7f4a46457c5d2dc193

    SHA512

    33a07e6f77153dc1c6afea3025dfc395a19ee12628c21804991a865bfbd89a552c255c74b5233d8ee4c50f146c161aafe0b22bf4e6d6895701588813257b54b8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Mo1gw81.exe
    Filesize

    1005KB

    MD5

    98a8b1cbaf165fe5107675205f957b21

    SHA1

    985b4e5a51c27a40d728b02b7e09d882e0a2998b

    SHA256

    81da921bb0c41b067b1d584846b4deafee41fb21fc1cab7f4a46457c5d2dc193

    SHA512

    33a07e6f77153dc1c6afea3025dfc395a19ee12628c21804991a865bfbd89a552c255c74b5233d8ee4c50f146c161aafe0b22bf4e6d6895701588813257b54b8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1cO46JX0.exe
    Filesize

    1.5MB

    MD5

    28560fcd62dd388ff5894401eb17b407

    SHA1

    ca7edff60a897dabbd043495b68b62f5f6d767d6

    SHA256

    354bc27f01908c6eba07ed177ceb393abb90a5d42adfda032a5940665c415d55

    SHA512

    6ef3779fd8a45899b206a59aa73f05da0b0beb4fe5768e7e386739cbd4e795751d024f3789a9e3273869e08026ae8b3a304ddad977c0369108429c98bd048397

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1cO46JX0.exe
    Filesize

    1.5MB

    MD5

    28560fcd62dd388ff5894401eb17b407

    SHA1

    ca7edff60a897dabbd043495b68b62f5f6d767d6

    SHA256

    354bc27f01908c6eba07ed177ceb393abb90a5d42adfda032a5940665c415d55

    SHA512

    6ef3779fd8a45899b206a59aa73f05da0b0beb4fe5768e7e386739cbd4e795751d024f3789a9e3273869e08026ae8b3a304ddad977c0369108429c98bd048397