Overview
overview
10Static
static
30314c3cf58...62.exe
windows10-2004-x64
10142ed11f80...59.exe
windows10-2004-x64
101f54336cee...4f.exe
windows10-2004-x64
102470f02746...37.exe
windows10-2004-x64
10357dca1dd0...e2.exe
windows7-x64
10357dca1dd0...e2.exe
windows10-2004-x64
10367729c840...03.exe
windows10-2004-x64
103ae8cc733e...e3.exe
windows10-2004-x64
103ff87c5bd0...30.exe
windows10-2004-x64
104157cda315...a6.exe
windows10-2004-x64
105f318080c6...ea.exe
windows10-2004-x64
10620f9ee1b4...8f.exe
windows10-2004-x64
106817354347...3a.exe
windows10-2004-x64
10753cdc12b9...91.exe
windows10-2004-x64
10a4215d26b6...74.exe
windows10-2004-x64
10a4375e040f...82.exe
windows10-2004-x64
10a619ae77d5...2e.exe
windows10-2004-x64
10aaab139650...12.exe
windows10-2004-x64
10aefec08eba...49.exe
windows10-2004-x64
10d12f5fa25c...70.exe
windows10-2004-x64
7e5b42981fd...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
0314c3cf5875f5a348b62f28e53ec17a9180933fb126d66b7184ebbc62e3c362.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
367729c84050746eb20cd233e6b8d8cfe0625110da6e43f4b4c486aa19d08103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3ae8cc733ec108080a1919852f9eed660c71dff454329a044b21af12ce8fa4e3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
3ff87c5bd0d476dfc954d3706672474698d1e412030e6189e037c2474b97b730.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
4157cda3159c7d2c99d18138d2e023dd1d821d09ae77e78901a80b26492981a6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
5f318080c6c0aef583c575f49bd61e9b4e8b6784f4c52b512e9c07090e4cedea.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
620f9ee1b442855f9904f5108cf7185b16d0acbacad9aaa076f02e0ffd4f588f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
753cdc12b984ece991f2018329d37985ee627640895e2d9b9a43a13a6dd6fb91.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
a4215d26b6f0c0e1bf7e0f7a14e39744684399db4b301d328c8f7df9ca1c0b74.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
a4375e040f13128a4dc747d845dd82b7204008c71beb526483b369eea30d2582.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
a619ae77d542717361e631ceb6fe3fab295af4ccef45ae4774b92a9355b6bb2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
aefec08ebaf1c6b975dbf83df5257e52d7efcbaf569ea4b633cec392af828049.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
d12f5fa25c8ef0ae322be4daa1b08acf499c9d1be60c2f8d6f6b5a65c28f0a70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
e5b42981fd5d352478cd9e79d582bc92295cb43d3d32dfd59e84008eb4216c65.exe
Resource
win10v2004-20240426-en
General
-
Target
aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe
-
Size
2.1MB
-
MD5
e1bb0f18d53291edb6b6b8c8bcbe60f4
-
SHA1
8354cb2797fbc00c57f193a6d0929dabd34e6981
-
SHA256
aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12
-
SHA512
dd5e7dbc48010a5057e20b0d056e03584600362a259dce65c5ab8d118b67e3f731243a65732b84d31f74d55d603f38532911e387946912431e99d7f9c17bb322
-
SSDEEP
49152:/nIg6uBuXvfZ7xjfgZGKAusjt5M1JVzxVgXDaQxlxz3H8OZBnCcpa:AgZuXLMBqkRveuk33ceB9p
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
Processes:
1nA70Zl3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1nA70Zl3.exe -
Executes dropped EXE 4 IoCs
Processes:
sK8ro38.exebC2dv33.exehD1LU99.exe1nA70Zl3.exepid process 1944 sK8ro38.exe 1132 bC2dv33.exe 1624 hD1LU99.exe 4624 1nA70Zl3.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
sK8ro38.exebC2dv33.exehD1LU99.exe1nA70Zl3.exeaaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sK8ro38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" bC2dv33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" hD1LU99.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1nA70Zl3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1976 schtasks.exe 2080 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exesK8ro38.exebC2dv33.exehD1LU99.exe1nA70Zl3.exedescription pid process target process PID 1736 wrote to memory of 1944 1736 aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe sK8ro38.exe PID 1736 wrote to memory of 1944 1736 aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe sK8ro38.exe PID 1736 wrote to memory of 1944 1736 aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe sK8ro38.exe PID 1944 wrote to memory of 1132 1944 sK8ro38.exe bC2dv33.exe PID 1944 wrote to memory of 1132 1944 sK8ro38.exe bC2dv33.exe PID 1944 wrote to memory of 1132 1944 sK8ro38.exe bC2dv33.exe PID 1132 wrote to memory of 1624 1132 bC2dv33.exe hD1LU99.exe PID 1132 wrote to memory of 1624 1132 bC2dv33.exe hD1LU99.exe PID 1132 wrote to memory of 1624 1132 bC2dv33.exe hD1LU99.exe PID 1624 wrote to memory of 4624 1624 hD1LU99.exe 1nA70Zl3.exe PID 1624 wrote to memory of 4624 1624 hD1LU99.exe 1nA70Zl3.exe PID 1624 wrote to memory of 4624 1624 hD1LU99.exe 1nA70Zl3.exe PID 4624 wrote to memory of 1976 4624 1nA70Zl3.exe schtasks.exe PID 4624 wrote to memory of 1976 4624 1nA70Zl3.exe schtasks.exe PID 4624 wrote to memory of 1976 4624 1nA70Zl3.exe schtasks.exe PID 4624 wrote to memory of 2080 4624 1nA70Zl3.exe schtasks.exe PID 4624 wrote to memory of 2080 4624 1nA70Zl3.exe schtasks.exe PID 4624 wrote to memory of 2080 4624 1nA70Zl3.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe"C:\Users\Admin\AppData\Local\Temp\aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sK8ro38.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sK8ro38.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bC2dv33.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bC2dv33.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hD1LU99.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hD1LU99.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1nA70Zl3.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1nA70Zl3.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:1976 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD56b423dca62e5e8a94b5d4976786641df
SHA1c12e94b378333797dfd0869d979a08c4302eaf02
SHA2568cbb04842aac696fbce9da2362c2b1572ca66f9f2972e23be9bec601f4a74bc3
SHA512321d400957366f4e456850bba33efab01a35b750b2dc2fc5d48c510efd53b89bc2020da80a34571da055c13032a8403724ae73b9a2e9f95594a44507fdeed0db
-
Filesize
1.2MB
MD5665cec995bdb483f597a0cb5eb79cb48
SHA1364c78d01947277a75ce592bdfcf065ee32bd10e
SHA2564d05531bf9a89230e4714f5828bcc2a132e79ab97f76d1b125be8cade96eb73d
SHA512401670cdaae76a905a5166926526761152225481251808f9d45deb0748cc09e3c3535c052bafae49d165ee83fe145c8e94cf13313e61b65481eb59268aeab597
-
Filesize
1.0MB
MD54b56210390fcbc0f78965d95f63d8ff4
SHA1e6c15c804b1c5eb5ed4bef3bcd24a07d9fbb7382
SHA256a33252eff27f8945f615969ec4fac0dc730b8d2c96a17c894e1ebd0bff648e09
SHA512c9655c456471ec883c88fdea83502b6d9181a7164e9fde9a9870f708be717828e6084f854b987c0c7a0fa51a290e09b76a9a74f21d976f96dc7d019f32633789
-
Filesize
1.3MB
MD541c888b33e0eb4c33c3202a2d1ae087b
SHA1a17e0f0db4e000172f0faa16c65df87cfafe97fe
SHA256b1c1579670d38a08c59c4b686cc739f743a34c653975b3a5c1285038c06c1874
SHA512105cf0dbba69d05eb6b738bb48a94e3b1d8028654103ec89f480af4fb451053dc1a57b7775b5e756affdc47b4d1b89475a70e22e5e77d8ef3dde5428798eb5c8