Overview
overview
10Static
static
30eb0accf09...b2.exe
windows10-2004-x64
1024941336d0...72.exe
windows10-2004-x64
1026a2cda7a1...98.exe
windows10-2004-x64
1029d3a95944...db.exe
windows10-2004-x64
102d75908c07...9b.exe
windows10-2004-x64
1033aed805e1...e6.exe
windows10-2004-x64
1040d8e0aa1d...18.exe
windows10-2004-x64
1048cb6f7d0b...c9.exe
windows10-2004-x64
10542eb4afaa...9a.exe
windows10-2004-x64
106f328c3e1d...2a.exe
windows10-2004-x64
1074692ca9aa...ea.exe
windows10-2004-x64
10759eb38c21...de.exe
windows10-2004-x64
10858cb57de5...0c.exe
windows10-2004-x64
109bd29cf05e...27.exe
windows10-2004-x64
7b0555f3c53...33.exe
windows10-2004-x64
10bde148bc51...21.exe
windows10-2004-x64
10c7e81c0377...b0.exe
windows7-x64
10c7e81c0377...b0.exe
windows10-2004-x64
10d0c5f5c327...0e.exe
windows10-2004-x64
10d165dd7703...70.exe
windows7-x64
10d165dd7703...70.exe
windows10-2004-x64
10d9645ca9ce...5b.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
0eb0accf09d83ec290b068c81be5e6c35e15cd72f8c10f74ea2ed429b7fcc8b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
24941336d0128a7ae974066981d3a1f75cc9af91a69a49b292688943f69afa72.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
26a2cda7a1e823b15014df6457ead29cc24ca1e9d7348e5f7ce65fac3e640998.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
29d3a95944732180e7b649fa96bb2f15636a9658a83828117964eea5a39c72db.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2d75908c0774dcb3f45e676b4c83554e0c2c94a1e96fd64e163484e0dbbf359b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
33aed805e114f04f73f867fdb7cf904e15447aa47f74e094c024c9b18c217fe6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
40d8e0aa1d01acecacb5b454de82773c5a4b5f13ec3abf8ee0ce0c906690a918.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
542eb4afaab2b90e95d070cb150ef76e8faa23f3afdd12ab49978cbb72dd389a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6f328c3e1d2f3ad40a09cd133e1964bbc4fc21dcbb7af8520e97006992426b2a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
74692ca9aa25e702576e835faf8a87d99d208bf02a87a5cd0cca52088e2e27ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
858cb57de5b9461a30d4dfd6c797315d00f9582d8210518ba989d761e6fb490c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bd29cf05e48e1f9b5f02750f58864848d24e66aab5b629f9133b674bc59b527.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b0555f3c536302c5af72051c3c2bc10649a88011e7aa16d3c661971df2866f33.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
bde148bc512eb25836030bebc3cbfd472cef53289015dbf4126dd1366b1c6421.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c7e81c037737d5a821cf236c8453b7b00607cd99d42863e39e0d703c731be6b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
c7e81c037737d5a821cf236c8453b7b00607cd99d42863e39e0d703c731be6b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d165dd77039589d5d25d898e400cb1806ef4225f7b6af17c51cc83c2ec12d070.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
d165dd77039589d5d25d898e400cb1806ef4225f7b6af17c51cc83c2ec12d070.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe
Resource
win10v2004-20240508-en
General
-
Target
759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe
-
Size
2.6MB
-
MD5
2f237df56b0d9a34018f8194c7930bb2
-
SHA1
0a910da14ff438217323d219e65ac7f5ccc162e2
-
SHA256
759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de
-
SHA512
b92fdbd542ef639bba2707ecf8e82182bc5f0394c4f0107ba6dbbc89225fce401d9665a18bd3bf48b4666d5ddacb2dd2cccb768da50e93e222ec13514d927d3b
-
SSDEEP
49152:v+Coe9XEDMEUkQSmGzVDprZBO7Eze6y4YCaT1+ousBNLiZ6+eC:WCo6rN70QcyrfR/+0+
Malware Config
Extracted
risepro
193.233.132.51
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
Processes:
1jm94wY6.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1jm94wY6.exe -
Executes dropped EXE 4 IoCs
Processes:
gX1Yh17.exeGs5BR46.exeEM0Qe63.exe1jm94wY6.exepid process 2992 gX1Yh17.exe 3704 Gs5BR46.exe 3496 EM0Qe63.exe 2120 1jm94wY6.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
1jm94wY6.exe759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exegX1Yh17.exeGs5BR46.exeEM0Qe63.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1jm94wY6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gX1Yh17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Gs5BR46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" EM0Qe63.exe -
Drops file in System32 directory 4 IoCs
Processes:
1jm94wY6.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 1jm94wY6.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 1jm94wY6.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1jm94wY6.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1jm94wY6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 636 schtasks.exe 4788 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exegX1Yh17.exeGs5BR46.exeEM0Qe63.exe1jm94wY6.exedescription pid process target process PID 1192 wrote to memory of 2992 1192 759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe gX1Yh17.exe PID 1192 wrote to memory of 2992 1192 759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe gX1Yh17.exe PID 1192 wrote to memory of 2992 1192 759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe gX1Yh17.exe PID 2992 wrote to memory of 3704 2992 gX1Yh17.exe Gs5BR46.exe PID 2992 wrote to memory of 3704 2992 gX1Yh17.exe Gs5BR46.exe PID 2992 wrote to memory of 3704 2992 gX1Yh17.exe Gs5BR46.exe PID 3704 wrote to memory of 3496 3704 Gs5BR46.exe EM0Qe63.exe PID 3704 wrote to memory of 3496 3704 Gs5BR46.exe EM0Qe63.exe PID 3704 wrote to memory of 3496 3704 Gs5BR46.exe EM0Qe63.exe PID 3496 wrote to memory of 2120 3496 EM0Qe63.exe 1jm94wY6.exe PID 3496 wrote to memory of 2120 3496 EM0Qe63.exe 1jm94wY6.exe PID 3496 wrote to memory of 2120 3496 EM0Qe63.exe 1jm94wY6.exe PID 2120 wrote to memory of 4788 2120 1jm94wY6.exe schtasks.exe PID 2120 wrote to memory of 4788 2120 1jm94wY6.exe schtasks.exe PID 2120 wrote to memory of 4788 2120 1jm94wY6.exe schtasks.exe PID 2120 wrote to memory of 636 2120 1jm94wY6.exe schtasks.exe PID 2120 wrote to memory of 636 2120 1jm94wY6.exe schtasks.exe PID 2120 wrote to memory of 636 2120 1jm94wY6.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe"C:\Users\Admin\AppData\Local\Temp\759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gX1Yh17.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gX1Yh17.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gs5BR46.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gs5BR46.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EM0Qe63.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EM0Qe63.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jm94wY6.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jm94wY6.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:4788
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:636
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5efc4bd8b637a7dea9986fed63dbc5c40
SHA122dd3b1ce38650f7fcd82c8932d21df6d91bc597
SHA2563904879e90d3dbd2cb7d1c1be8bc6bc506ec005efa6b56d5e2a2e2c766bc3d6d
SHA51280fa6599b1adfc764f9714c22c3b4d1ebc9afa585f3553c3f57ab5cd1bc35e5dace8856da7261b296ad7711533e8799a3315d86e3ac948a75d512b27d727280d
-
Filesize
1.7MB
MD5ab5f297515c9bc7e9e68c100aaf3def1
SHA1d3c6730d3e72bcb09792301bbb6557dc58944490
SHA256efd69f29417bb970bec5a1d5dfc3e5df6b59d154e0f68a0c8d05cc37a6e6d0a6
SHA512a4f25fd775c94cc1a1b8dac79263d514f94c7268277df001ebfc5f4284a2e8e7469beb6cef93780ffc3f2d6e3c9fe3ad2e7353a005515cc3ce5ce3496375434a
-
Filesize
789KB
MD5a9d62c7f1393fc22093b73bc9969e7f0
SHA11134f90cc6caa71c500de90fcb66bf2c148b3c84
SHA2567a0d7f5f0302059e87e4b357f23d2e5c38f73fe626f160d43af36307f6911c7c
SHA512e1b04c03ff1175b3aa2a739f93404bcb9022b83879c1880d90b1934565ae509af335432c421da76e1736bcaabcb91de224e258fed69d4496193181fb26bebbdf
-
Filesize
1.6MB
MD59072223b87307b943273764dfe3d3738
SHA138ed7126d8cd914a641dbcbb690dfafa3b6da3ba
SHA256dbe6d01b04868917f0d03eec94fc1040a9db7ce93d2e999692f949981337bfe4
SHA512fb6c54a0c19e8dfb3100aadda54c1f89494dfd885c89b612e3ead85cb8977b0429db96e2e9d26a6b7f1023b4cde638d86ba248f338aa8ed8554b010d21ae56a4