Overview
overview
10Static
static
30eb0accf09...b2.exe
windows10-2004-x64
1024941336d0...72.exe
windows10-2004-x64
1026a2cda7a1...98.exe
windows10-2004-x64
1029d3a95944...db.exe
windows10-2004-x64
102d75908c07...9b.exe
windows10-2004-x64
1033aed805e1...e6.exe
windows10-2004-x64
1040d8e0aa1d...18.exe
windows10-2004-x64
1048cb6f7d0b...c9.exe
windows10-2004-x64
10542eb4afaa...9a.exe
windows10-2004-x64
106f328c3e1d...2a.exe
windows10-2004-x64
1074692ca9aa...ea.exe
windows10-2004-x64
10759eb38c21...de.exe
windows10-2004-x64
10858cb57de5...0c.exe
windows10-2004-x64
109bd29cf05e...27.exe
windows10-2004-x64
7b0555f3c53...33.exe
windows10-2004-x64
10bde148bc51...21.exe
windows10-2004-x64
10c7e81c0377...b0.exe
windows7-x64
10c7e81c0377...b0.exe
windows10-2004-x64
10d0c5f5c327...0e.exe
windows10-2004-x64
10d165dd7703...70.exe
windows7-x64
10d165dd7703...70.exe
windows10-2004-x64
10d9645ca9ce...5b.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
0eb0accf09d83ec290b068c81be5e6c35e15cd72f8c10f74ea2ed429b7fcc8b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
24941336d0128a7ae974066981d3a1f75cc9af91a69a49b292688943f69afa72.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
26a2cda7a1e823b15014df6457ead29cc24ca1e9d7348e5f7ce65fac3e640998.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
29d3a95944732180e7b649fa96bb2f15636a9658a83828117964eea5a39c72db.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2d75908c0774dcb3f45e676b4c83554e0c2c94a1e96fd64e163484e0dbbf359b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
33aed805e114f04f73f867fdb7cf904e15447aa47f74e094c024c9b18c217fe6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
40d8e0aa1d01acecacb5b454de82773c5a4b5f13ec3abf8ee0ce0c906690a918.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
542eb4afaab2b90e95d070cb150ef76e8faa23f3afdd12ab49978cbb72dd389a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6f328c3e1d2f3ad40a09cd133e1964bbc4fc21dcbb7af8520e97006992426b2a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
74692ca9aa25e702576e835faf8a87d99d208bf02a87a5cd0cca52088e2e27ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
858cb57de5b9461a30d4dfd6c797315d00f9582d8210518ba989d761e6fb490c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bd29cf05e48e1f9b5f02750f58864848d24e66aab5b629f9133b674bc59b527.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b0555f3c536302c5af72051c3c2bc10649a88011e7aa16d3c661971df2866f33.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
bde148bc512eb25836030bebc3cbfd472cef53289015dbf4126dd1366b1c6421.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c7e81c037737d5a821cf236c8453b7b00607cd99d42863e39e0d703c731be6b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
c7e81c037737d5a821cf236c8453b7b00607cd99d42863e39e0d703c731be6b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d165dd77039589d5d25d898e400cb1806ef4225f7b6af17c51cc83c2ec12d070.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
d165dd77039589d5d25d898e400cb1806ef4225f7b6af17c51cc83c2ec12d070.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe
Resource
win10v2004-20240508-en
General
-
Target
48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe
-
Size
2.4MB
-
MD5
8c2e55dd1044f4892380ce8657f5a600
-
SHA1
75a534869704df93d70fe71086b3777fb9a39a5d
-
SHA256
48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9
-
SHA512
37b4266fe184fae9a7898b37286f5d9871067bbf80a771b2576c3a44a0a202278ed260ba9468f368e8a2d41cdfed51c567304e261c2c9de40b3fc0c07cbe31f3
-
SSDEEP
49152:6snSWMa6fYkSgV2kfXah4MMd1n/4UDtNnKe3t6JkO8o1P3f2p:1l6fYfg4EayBFDznKa6/8kP+
Malware Config
Extracted
risepro
193.233.132.51
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
Processes:
1db64uq2.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 1db64uq2.exe -
Executes dropped EXE 4 IoCs
Processes:
ys6Bi93.exeBa4eL47.exerU3Wv81.exe1db64uq2.exepid process 1164 ys6Bi93.exe 1600 Ba4eL47.exe 1304 rU3Wv81.exe 3828 1db64uq2.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
Ba4eL47.exerU3Wv81.exe1db64uq2.exe48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exeys6Bi93.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ba4eL47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" rU3Wv81.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 1db64uq2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ys6Bi93.exe -
Drops file in System32 directory 4 IoCs
Processes:
1db64uq2.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy 1db64uq2.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 1db64uq2.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1db64uq2.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1db64uq2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5076 schtasks.exe 2808 schtasks.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exeys6Bi93.exeBa4eL47.exerU3Wv81.exe1db64uq2.exedescription pid process target process PID 4988 wrote to memory of 1164 4988 48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe ys6Bi93.exe PID 4988 wrote to memory of 1164 4988 48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe ys6Bi93.exe PID 4988 wrote to memory of 1164 4988 48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe ys6Bi93.exe PID 1164 wrote to memory of 1600 1164 ys6Bi93.exe Ba4eL47.exe PID 1164 wrote to memory of 1600 1164 ys6Bi93.exe Ba4eL47.exe PID 1164 wrote to memory of 1600 1164 ys6Bi93.exe Ba4eL47.exe PID 1600 wrote to memory of 1304 1600 Ba4eL47.exe rU3Wv81.exe PID 1600 wrote to memory of 1304 1600 Ba4eL47.exe rU3Wv81.exe PID 1600 wrote to memory of 1304 1600 Ba4eL47.exe rU3Wv81.exe PID 1304 wrote to memory of 3828 1304 rU3Wv81.exe 1db64uq2.exe PID 1304 wrote to memory of 3828 1304 rU3Wv81.exe 1db64uq2.exe PID 1304 wrote to memory of 3828 1304 rU3Wv81.exe 1db64uq2.exe PID 3828 wrote to memory of 5076 3828 1db64uq2.exe schtasks.exe PID 3828 wrote to memory of 5076 3828 1db64uq2.exe schtasks.exe PID 3828 wrote to memory of 5076 3828 1db64uq2.exe schtasks.exe PID 3828 wrote to memory of 2808 3828 1db64uq2.exe schtasks.exe PID 3828 wrote to memory of 2808 3828 1db64uq2.exe schtasks.exe PID 3828 wrote to memory of 2808 3828 1db64uq2.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe"C:\Users\Admin\AppData\Local\Temp\48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys6Bi93.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys6Bi93.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ba4eL47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ba4eL47.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rU3Wv81.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rU3Wv81.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1db64uq2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1db64uq2.exe5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:5076
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:2808
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5216f51dff4e76987a59b423faac5f99d
SHA1c249eaae820785bbbfc78c18f81a0f9c3854d815
SHA25694b2b5a41be447f1a7f38958fcde89e2f2d4b553199bee2afc6549c5c8367ae9
SHA51227bcf4d90bae8e0818ae2be90342fe78be33bae1b837ac0bb4f83aa7642d32ced6de44203b9feecb93bf8874dde9e0042ac33aa4db20a33acabd27744720a6ae
-
Filesize
1.2MB
MD5693cfc0e9b5415e6a7bede3512c207f6
SHA1b656938e9359f5f18e7d06411a87e000900f9eb3
SHA25614092e634c754c78da00ad71eca1630025b55f06b4aa1d59321dacde957d3df8
SHA512c48c1da61b6fd2c15bc91651967eb7da21b9dfe011367eec61108fda8555aa673008828d74462a0621ad884297570cf33651a63efa5bdb46a86cff0b15f556b8
-
Filesize
1.1MB
MD57b51e76bc36d807faaf2a80a98a78d54
SHA1739c5ed2898f8e57481f3b2fb29a4ecaa75f218b
SHA256a8b41f615d62445e114b172150a0a2da059a2e6c686accef0bb7afc69becb2d7
SHA5121a31909686887eae35a4e4e616496f19dfc379fa48c3446fe66c3f260ae048dd9d29a1745cae950053a23157d269d648f768bec99748201c6781d19348778b9e
-
Filesize
934KB
MD5952851a6e17774488cf5304bd2331077
SHA1b46daccb4e36cc42c8866fde182da418195a1f1f
SHA256a85789898bc7733ac6668a157a9e0bb61f1aecfa98ca4185afb63ee5e360e560
SHA51231b2f82e6fa76651013a8cc7e71dc7f8ee1b3ef670b333f0fdb7e428e37c041b9acd43bc6873dddbf3046bad6eda5a0deaf619ba073bb7985cb2ce7364cc1734