Overview
overview
10Static
static
32ac9284d26...2e.exe
windows10-2004-x64
1046054179cb...c6.exe
windows10-2004-x64
74da066114f...cb.exe
windows10-2004-x64
1052fd0a92cd...e8.exe
windows10-2004-x64
1064b627f8b2...dc.exe
windows10-2004-x64
107343af2588...64.exe
windows10-2004-x64
10913938eed9...a6.exe
windows10-2004-x64
10963caa90e2...8b.exe
windows7-x64
10963caa90e2...8b.exe
windows10-2004-x64
10993b22cd0e...bb.exe
windows10-2004-x64
109e4d940a32...56.exe
windows10-2004-x64
10b093b62b3c...3a.exe
windows10-2004-x64
10b60133d8c6...87.exe
windows10-2004-x64
10b88e4acc8b...70.exe
windows10-2004-x64
10b9e66aabb2...21.exe
windows10-2004-x64
10ba66c3ba45...93.exe
windows10-2004-x64
10ca4dd99dd7...5e.exe
windows10-2004-x64
10da83df46c9...bd.exe
windows7-x64
10da83df46c9...bd.exe
windows10-2004-x64
10e40b073703...73.exe
windows10-2004-x64
10e90aeb6eb5...2c.exe
windows10-2004-x64
10fa7f367abb...e6.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
2ac9284d26694cef6e105c1d2811bfa8f9f4ad619164ac6068f85f79fdc93c2e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
46054179cb2d9b509f8a1029b4d1b357f32a91ab0af933d26deeaaae266db1c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
4da066114fff05c7f108852d67f4151134d789b0b406c964771aa61acdaf28cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
52fd0a92cd193f49dd929ce5ff9680fad847ee599a1bcf1b3d85bf92a28149e8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
64b627f8b2e8627a31f5ccb6fd6d30c39a1cd72c7bf4eb689910c2ce78d646dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
913938eed99c7cecb554ea106699cb053edd02b8f457631f7e810dff3f3bbfa6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe
Resource
win7-20240215-en
Behavioral task
behavioral9
Sample
963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
993b22cd0edfed671f3110dc80dd02946e17220bbeed7d83c7fc5abec04c3dbb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
9e4d940a325e9b72d46353fc864673d69a691a5708c222a2124623dbb1d29056.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
b093b62b3c10bec126678999d01ec29829b6cd97661fc6492cc56c7a9503c93a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b88e4acc8b5bc7d78960ffffe70c54c5b2d30e7010e22306b70f7cc6b4629370.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b9e66aabb221e3e3118a47d09299a0e6940e137a234b31c5a1aa3a72d2d96121.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
ba66c3ba45ca9b8976288e133180837ff25f0e016b2c79dc3945bba768329c93.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
ca4dd99dd7103ec05d0d43690019a1de3a654140e64a44ae16dc101ba0a5895e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
da83df46c9a090a82fe6e6cb5ea91ec010777168eccd438ca33ac3ac723c9ebd.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
da83df46c9a090a82fe6e6cb5ea91ec010777168eccd438ca33ac3ac723c9ebd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
e40b0737038122a56b3737a041c631f84c0e0d0fd97111d05f689d73301a2e73.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
e90aeb6eb581fc03df5540f7bbbc8cb887bb885815085075594020a3e9b2ec2c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
fa7f367abb26ee1daca84a0703ee7110f42a619fee072651c4f5efff7f782ae6.exe
Resource
win10v2004-20240508-en
General
-
Target
b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exe
-
Size
2.6MB
-
MD5
c48b4ebdf324b060e53d1e3a96fa5158
-
SHA1
c8d947e145ee5e19aa1d9ebd0c35f4601f8b4338
-
SHA256
b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987
-
SHA512
45b17b13e650ee38c460cb85436ff1a07c1dd7a55c5fc9c9afedf36beda75ede698d507c76cb98a92d44d53a3a4b29a0bee78cd4fade1fd1f7ab65b0d0e328dd
-
SSDEEP
49152:hyfcW4wLvAzhAxifZypwQFeNf2ZNBzWUCyEcdeRg70tyKqFaAE:4ftLGowQsf2ZXbZHwtLQE
Malware Config
Extracted
risepro
193.233.132.51
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
Processes:
1xb44kM4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1xb44kM4.exe -
Executes dropped EXE 4 IoCs
Processes:
Pn7KY93.exefr8vU53.exeQp4Mh95.exe1xb44kM4.exepid process 3124 Pn7KY93.exe 4552 fr8vU53.exe 2968 Qp4Mh95.exe 4404 1xb44kM4.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exePn7KY93.exefr8vU53.exeQp4Mh95.exe1xb44kM4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Pn7KY93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" fr8vU53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Qp4Mh95.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1xb44kM4.exe -
Drops file in System32 directory 4 IoCs
Processes:
1xb44kM4.exedescription ioc process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 1xb44kM4.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1xb44kM4.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1xb44kM4.exe File opened for modification C:\Windows\System32\GroupPolicy 1xb44kM4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2696 schtasks.exe 2116 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exePn7KY93.exefr8vU53.exeQp4Mh95.exe1xb44kM4.exedescription pid process target process PID 4428 wrote to memory of 3124 4428 b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exe Pn7KY93.exe PID 4428 wrote to memory of 3124 4428 b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exe Pn7KY93.exe PID 4428 wrote to memory of 3124 4428 b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exe Pn7KY93.exe PID 3124 wrote to memory of 4552 3124 Pn7KY93.exe fr8vU53.exe PID 3124 wrote to memory of 4552 3124 Pn7KY93.exe fr8vU53.exe PID 3124 wrote to memory of 4552 3124 Pn7KY93.exe fr8vU53.exe PID 4552 wrote to memory of 2968 4552 fr8vU53.exe Qp4Mh95.exe PID 4552 wrote to memory of 2968 4552 fr8vU53.exe Qp4Mh95.exe PID 4552 wrote to memory of 2968 4552 fr8vU53.exe Qp4Mh95.exe PID 2968 wrote to memory of 4404 2968 Qp4Mh95.exe 1xb44kM4.exe PID 2968 wrote to memory of 4404 2968 Qp4Mh95.exe 1xb44kM4.exe PID 2968 wrote to memory of 4404 2968 Qp4Mh95.exe 1xb44kM4.exe PID 4404 wrote to memory of 2696 4404 1xb44kM4.exe schtasks.exe PID 4404 wrote to memory of 2696 4404 1xb44kM4.exe schtasks.exe PID 4404 wrote to memory of 2696 4404 1xb44kM4.exe schtasks.exe PID 4404 wrote to memory of 2116 4404 1xb44kM4.exe schtasks.exe PID 4404 wrote to memory of 2116 4404 1xb44kM4.exe schtasks.exe PID 4404 wrote to memory of 2116 4404 1xb44kM4.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exe"C:\Users\Admin\AppData\Local\Temp\b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pn7KY93.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pn7KY93.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fr8vU53.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fr8vU53.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qp4Mh95.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qp4Mh95.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xb44kM4.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xb44kM4.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:2696 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:2116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD545c8b68ae3c623f7cd074127d80df234
SHA1adbf4bf699d776184e84e8779ebaea57c09c43b9
SHA256deb4e23b98911ae3a5f8b07b17815a1b4c24d045bd7c5609d5a545db8d1f60e9
SHA512cbb59bbab070db2c09c087b68649cfadf4a573589b775c188539e4daa30193b31e7c5aeec94132c4de069fcdec1c6fb9afd6ca589c7e5be4f0c69d78849a49e5
-
Filesize
1.7MB
MD5bcd0898f5dabbdf886511a079a282edf
SHA13f07f0244e3129c3d84628ec8bfd8fe665f9efed
SHA256476accb75c18f94ced4397d123b2b90fa771a272ee00c5b8dd99de4537e055b8
SHA512e2a73b7006b923d6c5b55fb453af85ad1698374b77bfa021bb814f459f0143b2bd907ce37ff3ee40d346f34bd5bd09a688d6b865372dcfee17404b5e9914ff84
-
Filesize
789KB
MD5d8a14f1f6e7974edc4421e501510c28d
SHA199296c728598238b22427ac71a23570c445e3009
SHA256b41180fcfecf2c5fbbb64e1c5c20383b639405c951efd034d4f3f6e579ff5bdf
SHA5127db76ae14914b6e4db3f6bd48ccb193d5518724fd7a1e40185d2c0eb344b11850a5c30f5972807f0c14ab166026d763ad1573ace5f4aeb2b26f4d4fcc34dc05d
-
Filesize
1.6MB
MD5817bc2b5e0eabce76e604daa77872eea
SHA1938cc92451d9155c37b2c371b7065687fce79373
SHA25674db4082d686b1ad522cbfc6a0a84f897f3b32531a84fb5968e355318e13a2b7
SHA512a9b8412588740c7fe1bd697cb06433c5f8379638f8fc5e8adee5a99b50aa46ef2144b7bdaa06e91f9db5f0c0fd00e488079f7e7e3526c613d77f127deb26ec3e