Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 12:33

General

  • Target

    e7cf07de33635cc163ae13ce8b8adfe9ec1289ef2a77d4635c1b02bd7bd80aa0.exe

  • Size

    2.1MB

  • MD5

    9db1eb824fcbb2d3a8896e726f5c5e0d

  • SHA1

    fcbcfe8421977a86bb88f0b8b95727bc1afb1f8a

  • SHA256

    e7cf07de33635cc163ae13ce8b8adfe9ec1289ef2a77d4635c1b02bd7bd80aa0

  • SHA512

    f5d426c9060336d5b9ae4bbf11155e712ea7ceb96b52c3974c3c89f2db900782eefc2692d6033a99a19c18407e005d796acdccbc0fd7a261d7248ca182d1428b

  • SSDEEP

    49152:yvEhs2vWs2I/tgLiDhu8T56Ps2V+nW5Na5adCRRf3OPTj0:ps6lO0d65tM5VRmP

Malware Config

Extracted

Family

risepro

C2

194.49.94.152

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7cf07de33635cc163ae13ce8b8adfe9ec1289ef2a77d4635c1b02bd7bd80aa0.exe
    "C:\Users\Admin\AppData\Local\Temp\e7cf07de33635cc163ae13ce8b8adfe9ec1289ef2a77d4635c1b02bd7bd80aa0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec0OM19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec0OM19.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\LR3sf18.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\LR3sf18.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bK9Bk20.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bK9Bk20.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4164
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aW85nj5.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aW85nj5.exe
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3932
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
              6⤵
              • Creates scheduled task(s)
              PID:384
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
              6⤵
              • Creates scheduled task(s)
              PID:3852
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4080,i,5711962389779687290,1245653010537220991,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:8
    1⤵
      PID:4720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec0OM19.exe

      Filesize

      1.6MB

      MD5

      2f01955d44d1da762bcd62f789561fa2

      SHA1

      da1958b1f5bd5d64f6da736b73e3c3c18419c57d

      SHA256

      fa875e3074b0c3657b93d6bb44c11a1d86c2a69924f382ca9d1746ef830b30e5

      SHA512

      0c985fd2ff2a1e544446a6e6fce6fd3de754e6619b185a160c0c9bc8cf304eedfa2a1306d41544bae73dcc404dd686557eb132b6a2159f2a8163231d2286755c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\LR3sf18.exe

      Filesize

      1.2MB

      MD5

      12bfc216d98735ffa3d6b4e419e1ec17

      SHA1

      237d3ba18dd905afa99904bf5d6f1fb5d1c035f5

      SHA256

      f1b3592af3a925081bbf08cfc0f07ff8dcfca44355665908c36a78a2768a9eec

      SHA512

      ce55ad4c3034613b2d2c02ba8a554a10318492b231383dd7638839b6b0340bc87d605d584b3f142a76b1ec01344fd17c60f4fee5e6f43043b441e061d1221a55

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bK9Bk20.exe

      Filesize

      1.0MB

      MD5

      817cbeb2e839a20531403773aac1681c

      SHA1

      90757d1fbdb9f56c910b9d458af22bab26c3f66c

      SHA256

      cac3ef0bc88b5f79980195622aadd060415ce6b24ecc49a3d35f05fe3d28967b

      SHA512

      a48e37cfa125cf4ef284ae563d5c5ebf294b781a08acefdb0098e4bb76156dc60e4fd54553b2b6f029e3befec28e8f169dcf3bfb957037f41ab5d6c28527fd8a

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aW85nj5.exe

      Filesize

      1.3MB

      MD5

      732adf2531963373a6020559f96db586

      SHA1

      7ed554585178a503ba7c4df7babd49b6754f2d7e

      SHA256

      cdd351ef1008bccfe1fbc064e0e10b44ad4a3ffa9f268085d28ecf43fd3ca5dc

      SHA512

      d7a4aff3d996c2fe8e8017ff91cc7b5cd52954e0b77f9087e95c3670780796f9a7ce1d181b9e29fc3429acbe36ad01a6d8e7b55757631cffe61e24e90412368d