Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:02

General

  • Target

    efd69f29417bb970bec5a1d5dfc3e5df6b59d154e0f68a0c8d05cc37a6e6d0a6.exe

  • Size

    1.7MB

  • MD5

    ab5f297515c9bc7e9e68c100aaf3def1

  • SHA1

    d3c6730d3e72bcb09792301bbb6557dc58944490

  • SHA256

    efd69f29417bb970bec5a1d5dfc3e5df6b59d154e0f68a0c8d05cc37a6e6d0a6

  • SHA512

    a4f25fd775c94cc1a1b8dac79263d514f94c7268277df001ebfc5f4284a2e8e7469beb6cef93780ffc3f2d6e3c9fe3ad2e7353a005515cc3ce5ce3496375434a

  • SSDEEP

    49152:Ad9uXDz2NBWIUezGVZtWd//R6VQflA0zXa+:XwoLP3ZZ

Malware Config

Extracted

Family

risepro

C2

193.233.132.51

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efd69f29417bb970bec5a1d5dfc3e5df6b59d154e0f68a0c8d05cc37a6e6d0a6.exe
    "C:\Users\Admin\AppData\Local\Temp\efd69f29417bb970bec5a1d5dfc3e5df6b59d154e0f68a0c8d05cc37a6e6d0a6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EM0Qe63.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EM0Qe63.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1jm94wY6.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1jm94wY6.exe
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:416
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
          4⤵
          • Creates scheduled task(s)
          PID:4540
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
          4⤵
          • Creates scheduled task(s)
          PID:1572
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
    1⤵
      PID:536
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
      1⤵
        PID:3908

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Scheduled Task/Job

      1
      T1053

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EM0Qe63.exe
        Filesize

        789KB

        MD5

        a9d62c7f1393fc22093b73bc9969e7f0

        SHA1

        1134f90cc6caa71c500de90fcb66bf2c148b3c84

        SHA256

        7a0d7f5f0302059e87e4b357f23d2e5c38f73fe626f160d43af36307f6911c7c

        SHA512

        e1b04c03ff1175b3aa2a739f93404bcb9022b83879c1880d90b1934565ae509af335432c421da76e1736bcaabcb91de224e258fed69d4496193181fb26bebbdf

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1jm94wY6.exe
        Filesize

        1.6MB

        MD5

        9072223b87307b943273764dfe3d3738

        SHA1

        38ed7126d8cd914a641dbcbb690dfafa3b6da3ba

        SHA256

        dbe6d01b04868917f0d03eec94fc1040a9db7ce93d2e999692f949981337bfe4

        SHA512

        fb6c54a0c19e8dfb3100aadda54c1f89494dfd885c89b612e3ead85cb8977b0429db96e2e9d26a6b7f1023b4cde638d86ba248f338aa8ed8554b010d21ae56a4