Overview
overview
10Static
static
309d331a688...e1.exe
windows10-2004-x64
100e5a6d1212...c7.exe
windows10-2004-x64
1018791f14fb...49.exe
windows10-2004-x64
10192d57a5a2...25.exe
windows10-2004-x64
71f41b39d2b...10.exe
windows10-2004-x64
102298c18576...bb.exe
windows10-2004-x64
102ec7b7ec25...b3.exe
windows10-2004-x64
102ff63e4636...cd.exe
windows10-2004-x64
103105fb3a2c...f2.exe
windows10-2004-x64
105233b9c00a...79.exe
windows10-2004-x64
1071ffbb500f...63.exe
windows10-2004-x64
1088b74d8884...16.exe
windows10-2004-x64
1093a899efb0...54.exe
windows10-2004-x64
1099144a8cae...06.exe
windows10-2004-x64
109c6fad81c8...19.exe
windows10-2004-x64
10b0c7a00ab4...9d.exe
windows10-2004-x64
10cbf1175688...f7.exe
windows10-2004-x64
10d722251ee6...28.exe
windows10-2004-x64
10daa8bcc1da...f2.exe
windows10-2004-x64
10e2046b06e3...39.exe
windows10-2004-x64
10Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:50
Static task
static1
Behavioral task
behavioral1
Sample
09d331a688384c2805b4ec4c498f7514d5a4bc6b953eff0ac62ec7820785b5e1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0e5a6d1212e96cbec9340713347cf31edfd53309be8f47f64e346582b70d4ac7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1f41b39d2b8ae20411682600943b3adf98567e247168192fb07ff103e71c9710.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
2298c1857648a2d03e7260fec6bd85ba96ff550973a7c8df1efc3ff5ee212abb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2ec7b7ec25de047e7eb1cd8f27cc8f7e111c7ac68d37c56e3938dee25147cbb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
2ff63e46365253076d5f6b65419f2c4110f1ceb32dbb57c43db28076bdd031cd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
3105fb3a2cc9654d1eac3354da0a10dfc792e32266a2a7a18fe16764e0b6bff2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5233b9c00ad7ff437dc70a2133e2e6251bcd63221cf9acbc7f1f8b00c9305c79.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
71ffbb500f4a8485edaa4aaeea3a716a9bbef886b7e16859b9f251f26a975963.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
88b74d8884f09632e668bea54668a44beb33e28e6d34636e7b8888fffc0f0f16.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
93a899efb0c194800223fca15c717009673f08a1a62d33fa602dfbcbc0b26454.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
99144a8cae61109b46016ef756589ba3aa71222da541e3bda432b738f7469d06.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
9c6fad81c8c5b4e4185f597e8ecb47fd56f1147c7c2bc851eb0e36a99fa9b019.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b0c7a00ab444001cd63f40a54db27100ea773e014721080a2b1279c33f37269d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
cbf11756881901fd292b570bc3bb19b579c924b2d7f37bb2cf69de109a1da4f7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d722251ee6167c7e35bae3b84b679d483609f718be9b0d4851cca6d9ccfdee28.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e2046b06e3810ca229ccfdfa24bc43ef690f3fb1808988596f1eec296ceadf39.exe
Resource
win10v2004-20240508-en
General
-
Target
daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe
-
Size
2.1MB
-
MD5
afe0c2cf35bf507d5ddf98521f598c8d
-
SHA1
f29f846fe109d71c7b06effb62c725400f92eba2
-
SHA256
daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2
-
SHA512
235876257c8fb6cd4c185f1b8c7ea5499b5da6abaed35efac4363d1f150440de8ac11f41f422e73ca5d191ab5b25df0f663b651bb1e8dbb068a9b1791c56d6ff
-
SSDEEP
49152:uxIYb9oY0LW8LicTGjz0neoPAkhqVP58xilKRLDzMRAIXCaMVgC:32qYZ1cKE4kCP5ArRvzwXEVgC
Malware Config
Extracted
risepro
193.233.132.51
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 4004 CG3sR12.exe 5076 vh9TG99.exe 2192 1As22et0.exe 4160 3lW53MR.exe 2100 4wm703nf.exe 4844 5Pq8kC0.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" CG3sR12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vh9TG99.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2100 set thread context of 2492 2100 4wm703nf.exe 101 PID 4844 set thread context of 3392 4844 5Pq8kC0.exe 107 -
Program crash 4 IoCs
pid pid_target Process procid_target 1380 2192 WerFault.exe 93 2456 2100 WerFault.exe 98 4084 2492 WerFault.exe 101 3012 4844 WerFault.exe 106 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3lW53MR.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3lW53MR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3lW53MR.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4160 3lW53MR.exe 4160 3lW53MR.exe 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3392 AppLaunch.exe 3392 AppLaunch.exe 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found 3348 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4160 3lW53MR.exe 3392 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found Token: SeShutdownPrivilege 3348 Process not Found Token: SeCreatePagefilePrivilege 3348 Process not Found -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4188 wrote to memory of 4004 4188 daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe 91 PID 4188 wrote to memory of 4004 4188 daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe 91 PID 4188 wrote to memory of 4004 4188 daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe 91 PID 4004 wrote to memory of 5076 4004 CG3sR12.exe 92 PID 4004 wrote to memory of 5076 4004 CG3sR12.exe 92 PID 4004 wrote to memory of 5076 4004 CG3sR12.exe 92 PID 5076 wrote to memory of 2192 5076 vh9TG99.exe 93 PID 5076 wrote to memory of 2192 5076 vh9TG99.exe 93 PID 5076 wrote to memory of 2192 5076 vh9TG99.exe 93 PID 5076 wrote to memory of 4160 5076 vh9TG99.exe 97 PID 5076 wrote to memory of 4160 5076 vh9TG99.exe 97 PID 5076 wrote to memory of 4160 5076 vh9TG99.exe 97 PID 4004 wrote to memory of 2100 4004 CG3sR12.exe 98 PID 4004 wrote to memory of 2100 4004 CG3sR12.exe 98 PID 4004 wrote to memory of 2100 4004 CG3sR12.exe 98 PID 2100 wrote to memory of 2492 2100 4wm703nf.exe 101 PID 2100 wrote to memory of 2492 2100 4wm703nf.exe 101 PID 2100 wrote to memory of 2492 2100 4wm703nf.exe 101 PID 2100 wrote to memory of 2492 2100 4wm703nf.exe 101 PID 2100 wrote to memory of 2492 2100 4wm703nf.exe 101 PID 2100 wrote to memory of 2492 2100 4wm703nf.exe 101 PID 2100 wrote to memory of 2492 2100 4wm703nf.exe 101 PID 2100 wrote to memory of 2492 2100 4wm703nf.exe 101 PID 2100 wrote to memory of 2492 2100 4wm703nf.exe 101 PID 2100 wrote to memory of 2492 2100 4wm703nf.exe 101 PID 4188 wrote to memory of 4844 4188 daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe 106 PID 4188 wrote to memory of 4844 4188 daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe 106 PID 4188 wrote to memory of 4844 4188 daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe 106 PID 4844 wrote to memory of 3392 4844 5Pq8kC0.exe 107 PID 4844 wrote to memory of 3392 4844 5Pq8kC0.exe 107 PID 4844 wrote to memory of 3392 4844 5Pq8kC0.exe 107 PID 4844 wrote to memory of 3392 4844 5Pq8kC0.exe 107 PID 4844 wrote to memory of 3392 4844 5Pq8kC0.exe 107 PID 4844 wrote to memory of 3392 4844 5Pq8kC0.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe"C:\Users\Admin\AppData\Local\Temp\daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CG3sR12.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CG3sR12.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vh9TG99.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vh9TG99.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1As22et0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1As22et0.exe4⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 6085⤵
- Program crash
PID:1380
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3lW53MR.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3lW53MR.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4wm703nf.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4wm703nf.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 6045⤵
- Program crash
PID:4084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 5764⤵
- Program crash
PID:2456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Pq8kC0.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Pq8kC0.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 5683⤵
- Program crash
PID:3012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2192 -ip 21921⤵PID:4952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2100 -ip 21001⤵PID:3480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2492 -ip 24921⤵PID:3372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4844 -ip 48441⤵PID:1824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:4104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
921KB
MD51aa3c447eda79c32302dccce50294402
SHA1e4267343233f20023e6fa032d58ebef0968e9441
SHA256ee2da068bb1ccc9df263f53f00576cdef581e0180cbf304245fac9d49099e66b
SHA512458f3d0c8f8c222c6617df7f718727c3e2b53ef0f2e1dc56adf8ab3bd964b848adb71a20cba3979fac58677f556b0250fd927726ac75157e6fd2ff6d68dd9c68
-
Filesize
1.7MB
MD5339fd123a1baaad7f4f493abeb6deb20
SHA17172defab124c85f61f521f851ca133b7b5a4f7a
SHA25641a9e013a1b1cda4f4c5fa8c2ada0623556e0362e1b45985b0eda54566e87dac
SHA5126da6c19694390a38a0ae2e13bbdbd67801210ea4f863d2fe1926388c5b0ea3db536e9bbc7730dfbb747d70c3fb56721866e00d1cbe35393e72e0bc872d96ce1d
-
Filesize
2.8MB
MD528f218ec2e9a5df5da2d41ff3ee945aa
SHA1840347940311573348a9e82077fbb362b1b22a4d
SHA256f41bbea1a34be00d1ba73854131aacc1547acce2fdd469fa200fa6b4335cdbd3
SHA512c27947a227e639a51ba4e2bdaa31831181354ba77bfd9947b4e59017c402b98fe0490be23198efa3ae03284f2c0342dba434bd9a5ba5e48462645cce04d43812
-
Filesize
789KB
MD568cdf648d5dd3adcaf9fcdf2ecb95556
SHA1e904613bc31af05dc772f6c116796e3f9e742220
SHA25649aab9740e60a019a3ef85588e28ffccbb6ec8056d3bdd78341ddfd994df1715
SHA512f0bdbf55a461e4622a25033dda00d3c3947d90671caab9fe43c4e745fbc34516a7ab015c04027a3befe809168d25be0b655ab0327afb876ebe0f17359d7d6951
-
Filesize
1.6MB
MD50d397ff22b030c90102fc89ba228fe94
SHA161126601e5bc81157307664a0422651a99da4b75
SHA256a7c48d42e33c58eb9d897431d77b43c9761506853e52043ca04439ba8c6b1ae9
SHA512c4cf90080c82032df2e433487f6064d60e52c1d82cddd5705cb7ad704ee56a865ab46f83b692b1ccd40a4e37e508d501440edf744842eebd9f2e05985ebf798e
-
Filesize
37KB
MD54e8a8d009806de8df78aad6faf45fd85
SHA13523def2a60b5523403fc9b07d7225bebd242b60
SHA2569a32fb90840dfcb93ffdc8c932f74500634c5a902e99ddeb05d918ecf3ab7d59
SHA5129c0e78dbb10349a98d5aa78e580529c663ff0a93a90edc9d13eb2425a112dc177d18fa837be162a48b93a184618ec3137a5413d5a8491521f15e8e5a4d48166f