Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 15:01

General

  • Target

    759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe

  • Size

    2.6MB

  • MD5

    2f237df56b0d9a34018f8194c7930bb2

  • SHA1

    0a910da14ff438217323d219e65ac7f5ccc162e2

  • SHA256

    759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de

  • SHA512

    b92fdbd542ef639bba2707ecf8e82182bc5f0394c4f0107ba6dbbc89225fce401d9665a18bd3bf48b4666d5ddacb2dd2cccb768da50e93e222ec13514d927d3b

  • SSDEEP

    49152:v+Coe9XEDMEUkQSmGzVDprZBO7Eze6y4YCaT1+ousBNLiZ6+eC:WCo6rN70QcyrfR/+0+

Malware Config

Extracted

Family

risepro

C2

193.233.132.51

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe
    "C:\Users\Admin\AppData\Local\Temp\759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gX1Yh17.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gX1Yh17.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gs5BR46.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gs5BR46.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3704
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EM0Qe63.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EM0Qe63.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3496
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jm94wY6.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jm94wY6.exe
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:2120
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
              6⤵
              • Creates scheduled task(s)
              PID:4788
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
              6⤵
              • Creates scheduled task(s)
              PID:636
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
    1⤵
      PID:3000
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
      1⤵
        PID:4564

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gX1Yh17.exe

        Filesize

        2.1MB

        MD5

        efc4bd8b637a7dea9986fed63dbc5c40

        SHA1

        22dd3b1ce38650f7fcd82c8932d21df6d91bc597

        SHA256

        3904879e90d3dbd2cb7d1c1be8bc6bc506ec005efa6b56d5e2a2e2c766bc3d6d

        SHA512

        80fa6599b1adfc764f9714c22c3b4d1ebc9afa585f3553c3f57ab5cd1bc35e5dace8856da7261b296ad7711533e8799a3315d86e3ac948a75d512b27d727280d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gs5BR46.exe

        Filesize

        1.7MB

        MD5

        ab5f297515c9bc7e9e68c100aaf3def1

        SHA1

        d3c6730d3e72bcb09792301bbb6557dc58944490

        SHA256

        efd69f29417bb970bec5a1d5dfc3e5df6b59d154e0f68a0c8d05cc37a6e6d0a6

        SHA512

        a4f25fd775c94cc1a1b8dac79263d514f94c7268277df001ebfc5f4284a2e8e7469beb6cef93780ffc3f2d6e3c9fe3ad2e7353a005515cc3ce5ce3496375434a

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EM0Qe63.exe

        Filesize

        789KB

        MD5

        a9d62c7f1393fc22093b73bc9969e7f0

        SHA1

        1134f90cc6caa71c500de90fcb66bf2c148b3c84

        SHA256

        7a0d7f5f0302059e87e4b357f23d2e5c38f73fe626f160d43af36307f6911c7c

        SHA512

        e1b04c03ff1175b3aa2a739f93404bcb9022b83879c1880d90b1934565ae509af335432c421da76e1736bcaabcb91de224e258fed69d4496193181fb26bebbdf

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1jm94wY6.exe

        Filesize

        1.6MB

        MD5

        9072223b87307b943273764dfe3d3738

        SHA1

        38ed7126d8cd914a641dbcbb690dfafa3b6da3ba

        SHA256

        dbe6d01b04868917f0d03eec94fc1040a9db7ce93d2e999692f949981337bfe4

        SHA512

        fb6c54a0c19e8dfb3100aadda54c1f89494dfd885c89b612e3ead85cb8977b0429db96e2e9d26a6b7f1023b4cde638d86ba248f338aa8ed8554b010d21ae56a4