Overview
overview
10Static
static
304a0e65087...2d.exe
windows10-2004-x64
100b23052e1d...05.exe
windows10-2004-x64
101319d83702...15.exe
windows10-2004-x64
1015bb5ac797...dd.exe
windows10-2004-x64
1019eb5c3dd8...ec.exe
windows10-2004-x64
102864919e9f...b7.exe
windows10-2004-x64
102f05412e59...2c.exe
windows10-2004-x64
103fd9e44b8d...84.exe
windows10-2004-x64
104920924329...b6.exe
windows10-2004-x64
106d6ab7a20c...33.exe
windows10-2004-x64
106e839edc16...b0.exe
windows10-2004-x64
106ff00efb56...f0.exe
windows10-2004-x64
107018985aa0...8e.exe
windows10-2004-x64
107b28b5b2ff...4e.exe
windows10-2004-x64
1093bee57b71...41.exe
windows10-2004-x64
10a22d19b8f1...9a.exe
windows10-2004-x64
10af3432152c...8d.exe
windows10-2004-x64
10bf27d39d4b...d1.exe
windows10-2004-x64
10db87d25edb...b5.exe
windows10-2004-x64
10f935568ec0...6c.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1319d8370208b00e5260cfc0b8f145575c62bd43ab6f76605a992afeb6737f15.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
15bb5ac797303fa462001ce5fd88a7bfc4702cd65f0a1768f9b994f6495a49dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
19eb5c3dd82e78329d1d98ef6b119402fff11484aea9cfea0e3e1135eea669ec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2864919e9fd253aa62ab37d5b02410fa89dd3ead4618da0b908d3b41e73167b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4920924329af964d29e90b0bd3763c20450919411ad6b6ddabfd88061a7555b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
6ff00efb56e1358cc67995d20e4e1edfffeb0789812a5cd830e2f477e16f63f0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7018985aa093121c146c37bf15499c6914c370d8b1e61fe98047260a3f0f5d8e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7b28b5b2ffa7298e1bc65ee1f5e49125dd2ae16da86952d43e4d1ac1e04c6e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
93bee57b7167fba61070c22f0c719ebb27499c5ff106633260f340e4917cf741.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a22d19b8f183bcd64a7c85a1e82f19e6db501a7e19b93ebc313864c2a0e6ce9a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f935568ec008833a6b510aaa18da8f703b0263d31ec0ee4a4442facb817a946c.exe
Resource
win10v2004-20240226-en
General
-
Target
2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe
-
Size
2.0MB
-
MD5
e14a5da9f1cafc8cff35c242ec462de8
-
SHA1
c02c0f33ab9efa83567f0d557c0bc20d07c83b6c
-
SHA256
2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c
-
SHA512
5360dbf58a58237fc8c339c5baa75f43d06ff24c0c21a293e2225f27a68b77784bdc2e31d955a58f23d7079a6023d88856896d8280eadec076c6264997c0e376
-
SSDEEP
49152:yIs1Ba02LAlGfwgKpc+u8NZSkzqa2BLGpaHD+L5w:JmkZRrwXzqXvHCL5w
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1Xz81zD7.exe -
Executes dropped EXE 4 IoCs
pid Process 3836 wl9XZ43.exe 1240 oH9dN44.exe 1412 jn3ck39.exe 736 1Xz81zD7.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" wl9XZ43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" oH9dN44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" jn3ck39.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1Xz81zD7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4496 schtasks.exe 4820 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3580 wrote to memory of 3836 3580 2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe 83 PID 3580 wrote to memory of 3836 3580 2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe 83 PID 3580 wrote to memory of 3836 3580 2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe 83 PID 3836 wrote to memory of 1240 3836 wl9XZ43.exe 85 PID 3836 wrote to memory of 1240 3836 wl9XZ43.exe 85 PID 3836 wrote to memory of 1240 3836 wl9XZ43.exe 85 PID 1240 wrote to memory of 1412 1240 oH9dN44.exe 86 PID 1240 wrote to memory of 1412 1240 oH9dN44.exe 86 PID 1240 wrote to memory of 1412 1240 oH9dN44.exe 86 PID 1412 wrote to memory of 736 1412 jn3ck39.exe 88 PID 1412 wrote to memory of 736 1412 jn3ck39.exe 88 PID 1412 wrote to memory of 736 1412 jn3ck39.exe 88 PID 736 wrote to memory of 4496 736 1Xz81zD7.exe 90 PID 736 wrote to memory of 4496 736 1Xz81zD7.exe 90 PID 736 wrote to memory of 4496 736 1Xz81zD7.exe 90 PID 736 wrote to memory of 4820 736 1Xz81zD7.exe 92 PID 736 wrote to memory of 4820 736 1Xz81zD7.exe 92 PID 736 wrote to memory of 4820 736 1Xz81zD7.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe"C:\Users\Admin\AppData\Local\Temp\2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wl9XZ43.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wl9XZ43.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oH9dN44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oH9dN44.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn3ck39.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn3ck39.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xz81zD7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xz81zD7.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:4496
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:4820
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD511fa7d74f6aa11ba33ba44af7fffdbcd
SHA199e635f18af726f2691a6d2af77d9555762a92d2
SHA256ac3bcf54180372b86b9f3f650aea7100a98c1fa7e055c73a77c94fe605e106f7
SHA51241e61d5814899b493973fcc28d5c8624115e528ddb0a727ab7b6c0014011a5e4df3fb5802445140f1ae0a53e782943050850436c092865f418914d5f5e151b97
-
Filesize
1.2MB
MD5580afecdf617bb9c5312a277b279d4d7
SHA15b191f648d2426aca8e15fbeb68eb37af9de1893
SHA2562914308d6d4369641c998c94b384b85b6b629570577d346befc431fb5a28ae78
SHA5121dbd4cdfe3eae9f096978a3f9d70af3eca84fb757d1a826ebf4d19080fc4901d0a6ad9839bd159db23481031566e7c8009ba91d42c1a87f7a7f4c72fd40d682a
-
Filesize
1.0MB
MD5d642fec84ec12b8a92e8fbce4a525d6e
SHA1eeb553510a4e273bbf3c9da9b13cb5992e8201b4
SHA256f0ff761bb0542fd940d65c2de70768524b4eb8831c86cbedf12eea684e64f95a
SHA5120dabf4d05a8ebff70e6877a66a1396a05dee80706f622f7e6570f78be86de398f3c1fbdba9a1c0642fc3fe35e670d3ba199eb7b0baec38c5a1ada5435999e7c8
-
Filesize
1.3MB
MD5aafb70498916a96eda38b89ab7b726ee
SHA1e860f5bbeb8ef2f70fd932e7f46c4329be932e11
SHA256bae44e1a643e813f64bca965acc8e573824f91a29aa763853e351721fe46292a
SHA512bd517c39751a5e7e73aca0ed3b3396aea733f8ee58668636b8e7326dbef2f219f7cdff3c4f70f50384ac6f8fee3c91de586f6d0f8d1b5a1aa5c5a0dd49d1cf1c