Overview
overview
10Static
static
304079e5802...9d.exe
windows10-2004-x64
101c1f4eb981...3b.exe
windows10-2004-x64
102598a43559...cf.exe
windows10-2004-x64
103aa30d5528...5d.exe
windows10-2004-x64
1046e0ffa2e7...59.exe
windows10-2004-x64
104cc86e1dc4...05.exe
windows10-2004-x64
1061799398ea...0c.exe
windows10-2004-x64
106bfb353493...b4.exe
windows10-2004-x64
1070f5b2bcd0...c3.exe
windows7-x64
1070f5b2bcd0...c3.exe
windows10-2004-x64
107363065308...5d.exe
windows10-2004-x64
10864fc02972...03.exe
windows10-2004-x64
10979a085483...e6.exe
windows10-2004-x64
109bbc6ca861...5b.exe
windows10-2004-x64
10a22013e24e...09.exe
windows10-2004-x64
10c31e600a38...cd.exe
windows10-2004-x64
10e2e852038c...e5.exe
windows10-2004-x64
10ec4e6a678a...72.exe
windows10-2004-x64
10f46c47981f...85.exe
windows10-2004-x64
10f603ceb39f...6e.exe
windows10-2004-x64
10fbe6d8ed22...1a.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
04079e58020489439890f3d5d0980b8ad79ac8f655923829037345651f2f1b9d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1c1f4eb981ff56766e6798073020add168a1f4134cf43e140302c7cec4a6763b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3aa30d5528ebe1b7856b26587d689c01c4a94547c022f9b29bb7c32708782f5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
46e0ffa2e7aeb3575c3fe8308892dec47716f852e6427bc2c8e904e9cad2c659.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cc86e1dc4a166b675f01f27f52e179d83773f43736e54f40427866d6708ef05.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
61799398eaa0d8b997b6fa9158074d701b10e120c7cac093e92c6dfbd278f50c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
979a085483810f4b695eb3d0c531439887861b90277b6ede2d4f9eb7983065e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
e2e852038c1504d54c9702b961095f0af961417103d2a5c8b10740dc188ac5e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ec4e6a678a24fbc6072d65beb0203bf9dc01f768df9a7430ed0d827b8d290172.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f603ceb39fc4d835e57a02751723a2eb0538b0f955a7772c30556e0e0d723f6e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a.exe
Resource
win10v2004-20240426-en
General
-
Target
c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe
-
Size
2.6MB
-
MD5
f20395ac362a1d473b92b841ccc6463b
-
SHA1
c25d1923e7bec213bf0d193732a7a652dceb1b0e
-
SHA256
c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd
-
SHA512
a7c15d4ecbc103a80f7f433235bba206198fdcbdbd162aaca6c200ab2b3ab1448609b69a61c11ebff6c95db10bf63b2cff115529c2ea2bb43b839ce8dc3e7b55
-
SSDEEP
49152:DezaMnKMoQrSaRz95oZvmV48/3Uo3DeaBuD9kQV0igwkX121kvWp/+:StnKM1zog4O3U+ykCpvOc2G/
Malware Config
Extracted
risepro
193.233.132.51
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1Da44xY6.exe -
Executes dropped EXE 4 IoCs
pid Process 688 Mg6Im30.exe 2004 MP2is69.exe 4764 el7Yi11.exe 408 1Da44xY6.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Mg6Im30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" MP2is69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" el7Yi11.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1Da44xY6.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy 1Da44xY6.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 1Da44xY6.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1Da44xY6.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1Da44xY6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2244 schtasks.exe 3164 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4788 wrote to memory of 688 4788 c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe 85 PID 4788 wrote to memory of 688 4788 c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe 85 PID 4788 wrote to memory of 688 4788 c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe 85 PID 688 wrote to memory of 2004 688 Mg6Im30.exe 87 PID 688 wrote to memory of 2004 688 Mg6Im30.exe 87 PID 688 wrote to memory of 2004 688 Mg6Im30.exe 87 PID 2004 wrote to memory of 4764 2004 MP2is69.exe 88 PID 2004 wrote to memory of 4764 2004 MP2is69.exe 88 PID 2004 wrote to memory of 4764 2004 MP2is69.exe 88 PID 4764 wrote to memory of 408 4764 el7Yi11.exe 89 PID 4764 wrote to memory of 408 4764 el7Yi11.exe 89 PID 4764 wrote to memory of 408 4764 el7Yi11.exe 89 PID 408 wrote to memory of 2244 408 1Da44xY6.exe 91 PID 408 wrote to memory of 2244 408 1Da44xY6.exe 91 PID 408 wrote to memory of 2244 408 1Da44xY6.exe 91 PID 408 wrote to memory of 3164 408 1Da44xY6.exe 93 PID 408 wrote to memory of 3164 408 1Da44xY6.exe 93 PID 408 wrote to memory of 3164 408 1Da44xY6.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe"C:\Users\Admin\AppData\Local\Temp\c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mg6Im30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mg6Im30.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MP2is69.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MP2is69.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\el7Yi11.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\el7Yi11.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Da44xY6.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Da44xY6.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:2244
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:3164
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5e39af14cb9eb9b89c4e5878309a2dce1
SHA1f0daa5398b877eca6c6e597fa5d44e4ae7b9b655
SHA256cd7789e74840d08d56eedfd469b459d895e55c3202c2a129e57737c7b721531e
SHA5126ecd9ffd1eca4ed6c65d50a86e94b7b3cac6b08c80745e4437227f5e33f3fae8ab5229ba89d42935ca0d61bcafe13ce4507a66d780d64932d5e8be28383f7776
-
Filesize
1.7MB
MD5bdc943e04b1cba2f605567796dc52483
SHA1471bcd08199b0cce7f3d0cee75edfce911de33db
SHA256800eef80053296a9aa78f5c7009c981a2d9d3b90e3971b958d4a08828f1ca32b
SHA51299bcfb3e541af4d9c172e2181a1b47aace7aac50a591f44af0c70d546c580e281549e238415c07eee66af1c4701309e3ae42f439a59c6767c43f067d8d25afc5
-
Filesize
789KB
MD535b5c9911b1b8613dffecac92b72ff62
SHA1f2898b0256a29fa0b70c2b5462c0761607d66bb3
SHA256c05d05a421aa8fb706e95958de9836ca3d0519caa880e76c6feb563c3ea2ce02
SHA512d23940f786024138a806d829989e79c86389a4961fe27053cb1af03d3b45819240cd4837273e5e1ffa97cd7de65a6e7df75aaaa34c17ab99a189c228f1869104
-
Filesize
1.6MB
MD54f14944a58e6f44e91a48f93bfbcf5a9
SHA14a0dcd96913ccd3439fa4e2660dcad5b79e582f8
SHA2568ebea4a6609600d452d557baae6b99752a5882f71459a0318453c087a1798da8
SHA5128ec30a8b287a4e0198a2174ff47d2462821c75cd82464b3442ada84119d8756e1c38e8f7caa3d3e9a42190d0bc06b5d9234a4e8d2930bcefa5051a74d3c3681b