Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/12/2023, 12:31
Behavioral task
behavioral1
Sample
good.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
good.exe
Resource
win10v2004-20231130-en
General
-
Target
good.exe
-
Size
1.6MB
-
MD5
81e30f580f1a0b6d719c84658469179d
-
SHA1
125c7c16efadafcb7e8c9374c4b034f8714f5da1
-
SHA256
9596077ce994b0a259cad7d45f7c848a763d913ae2fb3e86c21ec4b15b1255e5
-
SHA512
2d02bfe821a7e7b03f91ba53b9874f2420bcf237ae14d97b77753c30e74979286b0a3ca431724f5746462000c9fd6756da24937b52ef9ef2d8efe80d2dd33770
-
SSDEEP
49152:qWg8wUmZOzqiavjDUJO/WH89ctcO0ljbbQnIQGotBKqy8TJCHEGU42sn6:ZiUmZOzqiavjDUM/WH89y8bboGO
Malware Config
Extracted
risepro
193.233.132.51
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk good.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 good.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 good.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 good.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 good.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" good.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 5 ipinfo.io -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI good.exe File opened for modification C:\Windows\System32\GroupPolicy good.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini good.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol good.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 good.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString good.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2156 schtasks.exe 2792 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2880 good.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2156 2880 good.exe 29 PID 2880 wrote to memory of 2156 2880 good.exe 29 PID 2880 wrote to memory of 2156 2880 good.exe 29 PID 2880 wrote to memory of 2156 2880 good.exe 29 PID 2880 wrote to memory of 2792 2880 good.exe 31 PID 2880 wrote to memory of 2792 2880 good.exe 31 PID 2880 wrote to memory of 2792 2880 good.exe 31 PID 2880 wrote to memory of 2792 2880 good.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 good.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 good.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\good.exe"C:\Users\Admin\AppData\Local\Temp\good.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2880 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2156
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5b72ab0b80469f11937bee853346082bb
SHA166cb94dfbaa03b81f36f0f66276dcb151e1d41ef
SHA256f4b04c6894ffdb2dbff37b857809b74270ed3b7c419c9078ed25254d76a326ac
SHA512e101fffc43761b6ea81a91ba8d9a3fe21c659f9e2fbec9308cb59719a46b33cc0b51998c99f251a09c9f674fb0abccba14cc13320a1b3ec30bef732aeaf5b351
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD5a3ccf1db29ace0bb77cfa74eec3e0935
SHA11526cd3dd6d870a7cdeb79ba82cd32d0077f4dd1
SHA2566d1402a6a77d942f8ef214148a558eabf08edfd9afade6bdbf9549e6a8f012e1
SHA512678547768afd929f2b3c37af3fe3c54ff73d3406dbf9013237944988352977ae96840ede106c5972b72b5e6ad6af8a296e2265b84e53d972251857ed58183e96
-
Filesize
1.0MB
MD55f12124200f88140f369cfacbdeb5165
SHA17a2fd6ea77cd2461849947862c26055e5613baca
SHA256473986bd4b09a22c38f95d90710e3638494d0bbe5402cdaa119244c57f7e67ee
SHA5129539fd079965d510739a09d2110b71d371896330e602ae545b1673edd288f715786b13fa60f57a11dab03c1a0d0f1a00f8c77e326e21dbc9fbf15ba2eaa49469