Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
12/12/2023, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe
Resource
win10v2004-20231130-en
General
-
Target
cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe
-
Size
1.2MB
-
MD5
a55a2b69777af8a53d6a2ac02ada447f
-
SHA1
c06984d0a2f38d962b23c82f1965c1a005abc2ec
-
SHA256
cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8
-
SHA512
bc5c32a0b867af0430816bbecee55f65580614a0b4e6864f5ef2b3bfaf7f902a07362323d575df9bbe160c4700ba88ab84548f0a2d190d8ad36d73b3447392ec
-
SSDEEP
24576:WyR0w2vgoqQ/d4qULIhF6Wd1szo3GdRyXZz3nqC1PQyXlb7O4I63g:l+RDqaDtkWd1szo3u90PQyVb7Fx
Malware Config
Extracted
risepro
193.233.132.51
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1hl52Hr6.exe -
Executes dropped EXE 2 IoCs
pid Process 2136 zM8Ee42.exe 2056 1hl52Hr6.exe -
Loads dropped DLL 5 IoCs
pid Process 2044 cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe 2136 zM8Ee42.exe 2136 zM8Ee42.exe 2056 1hl52Hr6.exe 2056 1hl52Hr6.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zM8Ee42.exe Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1hl52Hr6.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 1hl52Hr6.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1hl52Hr6.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1hl52Hr6.exe File opened for modification C:\Windows\System32\GroupPolicy 1hl52Hr6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe 2592 schtasks.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2136 2044 cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe 28 PID 2044 wrote to memory of 2136 2044 cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe 28 PID 2044 wrote to memory of 2136 2044 cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe 28 PID 2044 wrote to memory of 2136 2044 cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe 28 PID 2044 wrote to memory of 2136 2044 cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe 28 PID 2044 wrote to memory of 2136 2044 cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe 28 PID 2044 wrote to memory of 2136 2044 cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe 28 PID 2136 wrote to memory of 2056 2136 zM8Ee42.exe 29 PID 2136 wrote to memory of 2056 2136 zM8Ee42.exe 29 PID 2136 wrote to memory of 2056 2136 zM8Ee42.exe 29 PID 2136 wrote to memory of 2056 2136 zM8Ee42.exe 29 PID 2136 wrote to memory of 2056 2136 zM8Ee42.exe 29 PID 2136 wrote to memory of 2056 2136 zM8Ee42.exe 29 PID 2136 wrote to memory of 2056 2136 zM8Ee42.exe 29 PID 2056 wrote to memory of 2720 2056 1hl52Hr6.exe 31 PID 2056 wrote to memory of 2720 2056 1hl52Hr6.exe 31 PID 2056 wrote to memory of 2720 2056 1hl52Hr6.exe 31 PID 2056 wrote to memory of 2720 2056 1hl52Hr6.exe 31 PID 2056 wrote to memory of 2720 2056 1hl52Hr6.exe 31 PID 2056 wrote to memory of 2720 2056 1hl52Hr6.exe 31 PID 2056 wrote to memory of 2720 2056 1hl52Hr6.exe 31 PID 2056 wrote to memory of 2592 2056 1hl52Hr6.exe 33 PID 2056 wrote to memory of 2592 2056 1hl52Hr6.exe 33 PID 2056 wrote to memory of 2592 2056 1hl52Hr6.exe 33 PID 2056 wrote to memory of 2592 2056 1hl52Hr6.exe 33 PID 2056 wrote to memory of 2592 2056 1hl52Hr6.exe 33 PID 2056 wrote to memory of 2592 2056 1hl52Hr6.exe 33 PID 2056 wrote to memory of 2592 2056 1hl52Hr6.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe"C:\Users\Admin\AppData\Local\Temp\cf1be540b34376e12082763c741c9aac3fa3ff8964b09e53d05a9f25766ae8a8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zM8Ee42.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zM8Ee42.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1hl52Hr6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1hl52Hr6.exe3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:2720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:2592
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5debbf940c4649038ec0ef78f99d3ab44
SHA1af70044e910652121a082c52922654aaea6a2119
SHA2569b6a7eb3d4e22c901867b6a570f8b29669844eb4776e2202fca1bd1fa2ec1a5b
SHA512c80393826f65b3288c95702c59f14aecea204479e17f8083b778b0280fc67bc8007130bd075f5f574477f3a5cf49823862ae6bd283edc201073723a42159d415
-
Filesize
789KB
MD5cda64ec08a1818f872952b056d7237d1
SHA1014f48780a94fcfc9f13b56a57766e92e683feec
SHA2566ebb6a5cd1c41925ef799504d352a5a74599d08314d77d811941cba14ca40133
SHA5123ab4913c1e15cc99418fd8d66b1b589e345d45e377626d3567f1295e080fc81baaafc7fc0a6dea4c55480c9e1bfacca4126648fc9a46371a0d37e5528f40cf87