Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12-12-2023 03:20
Behavioral task
behavioral1
Sample
894fdbe41d7fa24ddb08f16ace51561a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
894fdbe41d7fa24ddb08f16ace51561a.exe
Resource
win10v2004-20231127-en
General
-
Target
894fdbe41d7fa24ddb08f16ace51561a.exe
-
Size
1.6MB
-
MD5
894fdbe41d7fa24ddb08f16ace51561a
-
SHA1
2b2637864e8fa547760d1b09292976e5b6dde6d5
-
SHA256
e310cc6f7761ca6cb46dd3684a4397a0035d9818b8210fc33f2cf23e17a12df2
-
SHA512
94bb0f2e94b65e235590ae52425dc50a605870343b0241b86b33e87945128d773fe4459202eb029ed887979dd77ea1e7389a2737da4e863c0e10390de2c8b023
-
SSDEEP
49152:qWg8wUmZOzqiavjDUJO/WH89ctcO0ljbbQnIQGotBKqy8TJCHEGU42sn6:ZiUmZOzqiavjDUM/WH89y8bboGO
Malware Config
Extracted
risepro
193.233.132.51
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 894fdbe41d7fa24ddb08f16ace51561a.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 894fdbe41d7fa24ddb08f16ace51561a.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 894fdbe41d7fa24ddb08f16ace51561a.exe Key opened \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 894fdbe41d7fa24ddb08f16ace51561a.exe Key opened \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 894fdbe41d7fa24ddb08f16ace51561a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 894fdbe41d7fa24ddb08f16ace51561a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 5 ipinfo.io -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 894fdbe41d7fa24ddb08f16ace51561a.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 894fdbe41d7fa24ddb08f16ace51561a.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 894fdbe41d7fa24ddb08f16ace51561a.exe File opened for modification C:\Windows\System32\GroupPolicy 894fdbe41d7fa24ddb08f16ace51561a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 894fdbe41d7fa24ddb08f16ace51561a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 894fdbe41d7fa24ddb08f16ace51561a.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe 2632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2368 894fdbe41d7fa24ddb08f16ace51561a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2624 2368 894fdbe41d7fa24ddb08f16ace51561a.exe 28 PID 2368 wrote to memory of 2624 2368 894fdbe41d7fa24ddb08f16ace51561a.exe 28 PID 2368 wrote to memory of 2624 2368 894fdbe41d7fa24ddb08f16ace51561a.exe 28 PID 2368 wrote to memory of 2624 2368 894fdbe41d7fa24ddb08f16ace51561a.exe 28 PID 2368 wrote to memory of 2632 2368 894fdbe41d7fa24ddb08f16ace51561a.exe 30 PID 2368 wrote to memory of 2632 2368 894fdbe41d7fa24ddb08f16ace51561a.exe 30 PID 2368 wrote to memory of 2632 2368 894fdbe41d7fa24ddb08f16ace51561a.exe 30 PID 2368 wrote to memory of 2632 2368 894fdbe41d7fa24ddb08f16ace51561a.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 894fdbe41d7fa24ddb08f16ace51561a.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 894fdbe41d7fa24ddb08f16ace51561a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\894fdbe41d7fa24ddb08f16ace51561a.exe"C:\Users\Admin\AppData\Local\Temp\894fdbe41d7fa24ddb08f16ace51561a.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2368 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD5a9106601d1da546890de28d81929979e
SHA1828bc3a06312792901b442cd9f76f20282c27ec2
SHA256bdc9e5ae32b7dc801fc4ffe9197e5548831b4dd33bb676fdc90a730e3dfd49e8
SHA512c123c00b91d16e01bcfcb71fca33349bd837a559763d2807b9bf1c0d35525034402a842cebd2213f4b9739a934957390c7f7f7892fee901b70d0057c04e97c16
-
Filesize
1.6MB
MD5894fdbe41d7fa24ddb08f16ace51561a
SHA12b2637864e8fa547760d1b09292976e5b6dde6d5
SHA256e310cc6f7761ca6cb46dd3684a4397a0035d9818b8210fc33f2cf23e17a12df2
SHA51294bb0f2e94b65e235590ae52425dc50a605870343b0241b86b33e87945128d773fe4459202eb029ed887979dd77ea1e7389a2737da4e863c0e10390de2c8b023