Overview
overview
10Static
static
318b5f5ec44...05.exe
windows10-2004-x64
10246983943f...51.exe
windows10-2004-x64
10733ef926ae...74.exe
windows10-2004-x64
1081efe73b97...49.exe
windows10-2004-x64
1085d15c9234...a9.exe
windows10-2004-x64
10869bcbfd03...c1.exe
windows10-2004-x64
1088bcbe8e48...0e.exe
windows10-2004-x64
108e3b7e61aa...83.exe
windows10-2004-x64
1095ebfb1a5d...7b.exe
windows10-2004-x64
10a14a0df7d6...b5.exe
windows10-2004-x64
10a7de715d1e...f4.exe
windows10-2004-x64
10a95d0a23b0...b5.exe
windows10-2004-x64
10acced6c53e...9e.exe
windows10-2004-x64
10ad4ff817f4...f4.exe
windows10-2004-x64
7b5f2197dc6...dc.exe
windows10-2004-x64
10c354814644...fc.exe
windows10-2004-x64
10d12b0975bf...82.exe
windows10-2004-x64
10d49cc2c525...f0.exe
windows10-2004-x64
10e48626da66...e6.exe
windows10-2004-x64
10e622b46224...bc.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
18b5f5ec443576ad4102d53a0366fc22c8cffc5e42177408ed6e4752ad377905.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
733ef926aecde5ac2059782a5f2fb64f8fbbf625f2beb3ca397e8b56c0b4a574.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
81efe73b978b0562c9e65634dc76439053942720aa56e6ff1e4cfc01f3ec0c49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
85d15c923467e5894a2f36bf8563a0591dc6653d4ebd713eac8de5f3a57655a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
88bcbe8e48f13c79125efeaff65fe5dcb719586f4683dca74f0287cdab35e40e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
8e3b7e61aa74a089a79cac60eb4ab68e048ad684cd4c79b7d000b22321106983.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
95ebfb1a5d55b902b4834a06e334e1b7810e32d19a0d5e6890b33312d33dac7b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
a7de715d1ee0762a29e3132e9fda5b98002750ef8ee53571208fe8b92f6225f4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a95d0a23b0c5bde5da2656477d19360bb7e1014fc2da653fed9ec6dd0b31cfb5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ad4ff817f44ff7266fb94f8757fc6afe62664e7c937dabddb1878c1ca9407cf4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b5f2197dc65f7c8ffbd0e39caf14248edd08aa46f69db02db370ce1daa32ebdc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c35481464455ec62b97d08f9bcb8ac75eadf87ffc4cfef30c3c3fd9edaa597fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
d49cc2c52587d7ccfff0f04de2d9313a7352fee098cd64deb7bb55ca2cecd7f0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
e622b4622421bb1baa18a66801c5d86fb7ae8872788326cfc9670abde556f2bc.exe
Resource
win10v2004-20240426-en
General
-
Target
246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe
-
Size
1.6MB
-
MD5
08dd4f1a04331e7f482a48785648dbb6
-
SHA1
50060e856725b20d75fec4466019961caafcfcc7
-
SHA256
246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51
-
SHA512
e0ad56ac549196cadbed4c4c2aa8d0dbd79a2754c12625ddc43ad47cb05eba2eef5f94b666107548111efce436143cbce886d445941b351128b8c3090e7af149
-
SSDEEP
49152:eDQwiy/LlaKjlA/DUKWbNVuTYnAWbvQizMaa:V6/LlnMUnAIvwaa
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1mK90fZ1.exe -
Executes dropped EXE 4 IoCs
pid Process 2592 Tm9UN08.exe 3876 PN0mL84.exe 3384 MZ1Gx23.exe 1488 1mK90fZ1.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1mK90fZ1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Tm9UN08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" PN0mL84.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" MZ1Gx23.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1724 schtasks.exe 3944 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2592 2400 246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe 83 PID 2400 wrote to memory of 2592 2400 246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe 83 PID 2400 wrote to memory of 2592 2400 246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe 83 PID 2592 wrote to memory of 3876 2592 Tm9UN08.exe 85 PID 2592 wrote to memory of 3876 2592 Tm9UN08.exe 85 PID 2592 wrote to memory of 3876 2592 Tm9UN08.exe 85 PID 3876 wrote to memory of 3384 3876 PN0mL84.exe 86 PID 3876 wrote to memory of 3384 3876 PN0mL84.exe 86 PID 3876 wrote to memory of 3384 3876 PN0mL84.exe 86 PID 3384 wrote to memory of 1488 3384 MZ1Gx23.exe 87 PID 3384 wrote to memory of 1488 3384 MZ1Gx23.exe 87 PID 3384 wrote to memory of 1488 3384 MZ1Gx23.exe 87 PID 1488 wrote to memory of 1724 1488 1mK90fZ1.exe 88 PID 1488 wrote to memory of 1724 1488 1mK90fZ1.exe 88 PID 1488 wrote to memory of 1724 1488 1mK90fZ1.exe 88 PID 1488 wrote to memory of 3944 1488 1mK90fZ1.exe 90 PID 1488 wrote to memory of 3944 1488 1mK90fZ1.exe 90 PID 1488 wrote to memory of 3944 1488 1mK90fZ1.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe"C:\Users\Admin\AppData\Local\Temp\246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tm9UN08.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tm9UN08.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PN0mL84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PN0mL84.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\MZ1Gx23.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\MZ1Gx23.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1mK90fZ1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1mK90fZ1.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:1724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:3944
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD567326302239f25568dbb4f601d1370fb
SHA13e1e2fe14d94c25c0dbdf0f11a7a416f1f7b8713
SHA2560d321f6ad00efd80a7222645d9aa33e7a3cf860e83abc01db2f4d238b59f402c
SHA512b9dbf4cf0f4f3c69b0b3795c84eb2a6f48788cc50c17c15efdc39673bdcd1e1b26b2f7ba19d5cb5972042c70d4b58fa2da2373a84d68b8595ef0e2349ae18432
-
Filesize
989KB
MD5b612e4381d50dcbccc70fca31365cbc7
SHA1fd472d72219881d1813c1e436283f4de5f0f9562
SHA256a316b9a17dc40034038a4dabaa3499a51b6c28bea68bbe217ab6e37d1eed7369
SHA5129264af5d2b39ed33e8a3934f24d75467a9e522bc5d49f19a9b976362a993aadb800b3fd51f90930e21f3a9a7f570449f4f5ce93e7e8201ec1eacb62e09808c47
-
Filesize
866KB
MD55dbdaaa2b2e75404e9f5266e8f454724
SHA19bf3a8b06027c71a48fab868074f0e029ae47432
SHA25695ebfb1a5d55b902b4834a06e334e1b7810e32d19a0d5e6890b33312d33dac7b
SHA512da5fb40ad210b375f7de85c2989484e9ad22c184dfe5e2aad13697b237e6ac13adf83f6e12a049a3c018f85e0d601b253b734f88b7504f559ae632b253d3ef7e
-
Filesize
1.5MB
MD518276ecd00e0f1c1d41b037dd64ad745
SHA1310815f06f2666c1a0898ebc681072c7c24f470d
SHA25680eccd3e8df221316f0a52a6d636066319b3ed334b7e890444cb0891049c186c
SHA512e1a6be4aa1412f96760aad8b1b7eb2c29a72439be6f38ff92074885d904381fd195135e383499a0cf1810c16f0779e228cc0c9b13bec59291ea3676d86e00274