Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 19:03

General

  • Target

    8c279e4e627a1cf50482f625b1ee518eae0ac11a42f443c27e6f6ee04c180212.exe

  • Size

    1.1MB

  • MD5

    ed888651c68b1cf8488cc0699d2f7743

  • SHA1

    421586dcebb5d402b53e5153cd497d760f82f4ac

  • SHA256

    8c279e4e627a1cf50482f625b1ee518eae0ac11a42f443c27e6f6ee04c180212

  • SHA512

    ef84d57aefe109f83fd4040acbe53bfda3b5b384f6d2b2794b907713f7f70d40796a6ab349a0cd938752edcf8b31b61804ab6913183b13b390f0ec5397519207

  • SSDEEP

    24576:5ykxqe6jmiTbMFiMOTLwaPKQnA+S2gZlH2:skAfM0MOgXxLH

Malware Config

Extracted

Family

risepro

C2

193.233.132.51

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c279e4e627a1cf50482f625b1ee518eae0ac11a42f443c27e6f6ee04c180212.exe
    "C:\Users\Admin\AppData\Local\Temp\8c279e4e627a1cf50482f625b1ee518eae0ac11a42f443c27e6f6ee04c180212.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1bY74OI8.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1bY74OI8.exe
      2⤵
      • Executes dropped EXE
      PID:2140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 632
        3⤵
        • Program crash
        PID:1004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3op33xW.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3op33xW.exe
      2⤵
      • Executes dropped EXE
      PID:3856
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2140 -ip 2140
    1⤵
      PID:5024
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:856

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1bY74OI8.exe
        Filesize

        934KB

        MD5

        6eb84333807c5944dc621f5f0d1f2445

        SHA1

        bee304d55c583a8cd9edb6a3b89d13fa6d209e02

        SHA256

        ba692868229a98851f79b89e88f2e612d73b53a5390aa14a2f44eb85542f2f47

        SHA512

        2fdd8d2d0c5b4400bcd86c34b34f276578052d6292bce6f1104eee9ae35187bd135bf917fa7242cd6ed0829735cb670fe5314356d2aa5eb8981cd5c559f2d763

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3op33xW.exe
        Filesize

        182KB

        MD5

        d0e5ea126f0d61af6672812e973e7611

        SHA1

        36b9bee76f643fa039250dafdd8518fc9edc016d

        SHA256

        4594b06362167aa354e71617d6a8e9478ac7856d1b02dacd96e1b1d78427e880

        SHA512

        a7f923ee550722fbf60ded663485789416419d88b809b59525ffea59d5b252effede922c93ae46e8b448a0bbbbd6c805a24fe64d0f6a8c3c82dc08d3dfa499ce

      • memory/2140-10-0x0000000000400000-0x0000000000598000-memory.dmp
        Filesize

        1.6MB

      • memory/2140-9-0x0000000002750000-0x00000000028E5000-memory.dmp
        Filesize

        1.6MB

      • memory/2140-12-0x0000000002750000-0x00000000028E5000-memory.dmp
        Filesize

        1.6MB

      • memory/2140-11-0x0000000000400000-0x000000000090C000-memory.dmp
        Filesize

        5.0MB

      • memory/2140-8-0x0000000002670000-0x0000000002746000-memory.dmp
        Filesize

        856KB

      • memory/3856-16-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/3856-17-0x00000000025B0000-0x00000000025CC000-memory.dmp
        Filesize

        112KB

      • memory/3856-18-0x0000000004D60000-0x0000000005304000-memory.dmp
        Filesize

        5.6MB

      • memory/3856-19-0x0000000002670000-0x000000000268A000-memory.dmp
        Filesize

        104KB

      • memory/3856-20-0x00000000027A0000-0x0000000002832000-memory.dmp
        Filesize

        584KB

      • memory/3856-22-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB