Analysis

  • max time kernel
    130s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 18:04

General

  • Target

    2024-05-24_c9147af9fe0c0f9b3c412b917cc84bcf_avoslocker_magniber_metamorfo.exe

  • Size

    13.1MB

  • MD5

    c9147af9fe0c0f9b3c412b917cc84bcf

  • SHA1

    29d1bcb8af1370e1056221a6934879484d583cdf

  • SHA256

    4d9f2e9d386176333d4e46ea979367cf3362f63d00905c19932a9d75f77379c0

  • SHA512

    855618151344c4175a14d98f27f07c6ae01acfef08bb58c16e406262834f3198a2bd13543bdf67a1b7e1a5bd97e32080525d655939f9452256aae5b28aefddb4

  • SSDEEP

    393216:Y1DwLi7fL4O4OoVkkb8/++otXOCcd1rqNa/GX7dR:Y1DwGDL4O7oVkkb8G+oo/GXBR

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 5 IoCs
  • Modifies registry class 46 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-24_c9147af9fe0c0f9b3c412b917cc84bcf_avoslocker_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-24_c9147af9fe0c0f9b3c412b917cc84bcf_avoslocker_magniber_metamorfo.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.355.3101\412172D9-30FC-4243-A91C-96802364043D\SodaPDFDesktop14.exe
      C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.355.3101\412172D9-30FC-4243-A91C-96802364043D\SodaPDFDesktop14.exe /update=start
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\89942D73-BCBB-454E-9576-7512C21FA7E4\SodaPDFDesktop14.exe
        "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\89942D73-BCBB-454E-9576-7512C21FA7E4\SodaPDFDesktop14.exe" /update=finish /second-instance
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4748
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:1608
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /welcome /no-check-updates
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:3840
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /CleanupTempFolder /ParentProcessId=4748
          4⤵
          • Executes dropped EXE
          PID:4512

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Soda PDF Desktop 14\Installation\updates-info.json
    Filesize

    2KB

    MD5

    990205d335d67c3607f4f900769d64ce

    SHA1

    f59a60bd8b60938ec3339eb6a24ba283537d6b27

    SHA256

    b6c72a6daac2f49f676df42bfae638ba5e4a40affab21d36201dab7ec8302a3e

    SHA512

    670dae868a25416424b749fd4ecead5ceea3edd63f0098f3c22378409095f92241a32cc0c2fd0d4f5a774ab3c3ff55c06e379db13fb402acb5a6f504b027df75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF
    Filesize

    812B

    MD5

    ec95ba152315371a12b61e59736ef2af

    SHA1

    5420ca8697ddefc184f61745f4737305a68a4e75

    SHA256

    55c56ef40fb19a4cf6d03acd5c5232286fe429d79e0f619701f32d51a5428198

    SHA512

    ecb8c92181c02083b06272b5d92acbbc51abcd3eee7e42e06d8df77fb2e4240d5fd2f5a1a084dc9c4f7945218fadc1f6a4532145c12dbc1887961cee79f19be9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    1KB

    MD5

    3bfb237d95f9c34465d50360f39b3ceb

    SHA1

    2cdee845ea6ebbd3cd0466b0eae4752842de86cc

    SHA256

    2ceaddb29268e6112e7aa95722894fb061238ad4e2b247ce23595609daa5eb8d

    SHA512

    da55bf0fd898acda5dfd2366a96d439807e502c763dca35c3a119c3ab45f6e3d821a1e3fd29858e333606ef0e822f3373b9cb8c41d95736131bb001ad5b6a16f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D
    Filesize

    1KB

    MD5

    dbb135425fd0556c1acb32dee627f8b0

    SHA1

    04b99c61aa6b5111c34c2fdaff52084a1514f899

    SHA256

    9b08dff2d0e8d15f11e7acccf878f3e139626557addcd5a9a11fbfd68cf66565

    SHA512

    59e7436a4622fb62aeaac94de13a633be5f89ed5b7ff3c6dee09895ff6f4ea99da38df677029d6cb16a01bbbe2c1d36281cc65a72651777071ce83ff0ff84860

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0
    Filesize

    806B

    MD5

    ac73c4388d7900356239d24c9c7a4419

    SHA1

    75b483909dd63f1453c9f79217097d410df5fc50

    SHA256

    b50d2b322449ef4022597d3367fd706c353939994d19c49efa544df1205a5342

    SHA512

    0b521d0f1338f943f08d1d79b03a5d513dc6880a7533682a99fbe26d4cfc53199d12a1bf65ec2d094607862075bdd567397671d2339ce24fd6c0946f16442dbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF
    Filesize

    540B

    MD5

    437809a1918bc512ea8cd4ec40cef5e8

    SHA1

    782985c9983bb1679ab1e9cf291d25f4f0bb2d04

    SHA256

    93edd999e6e062d5ed29309624cdb4a01247008e2aed85bf4bae34719f4fe3c8

    SHA512

    8f8b7f440967051cfd41097b93b98e985171b9b5ee996ae54b47c98a04b95ae7f90df9fceba426f466db6ebec0c8427c194c25d7793c2965e0d310cd58e351c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    410B

    MD5

    0bfa91e53d801c313c3331b2070f9fff

    SHA1

    a0b9c130dfd543df740aaa97df9c6feef0146399

    SHA256

    e06512ee42d31e7aab267c899061f8bd7b1a3661dedcdad14ea4340eba03a367

    SHA512

    2dce2d7c2a72326a435f85199c16c234454ed4c9ee791f8aa1d8ee46da0425c3f290d894fac90ecf277d5a8454b2eeaeabc5aee3697b67b81b3455b905dadf30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D
    Filesize

    528B

    MD5

    3a5eb2b39e3e40bc187ac49ac8b1256b

    SHA1

    6c31d9f9f9e6b00b1dfacfd556291e60cab8c8a2

    SHA256

    f90db141fe4c8c8df0ad66ea3c12b7df7982e732f96858d45ba728f8187a1f8b

    SHA512

    19b62fbdd38a439f3cf257c0ca379561fad477d147dbf56fbbdc9380a29d2ba1f868460954e62f3201339e63799ecc565be21ac1c5cc2d9c62b4d3e36dc33789

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0
    Filesize

    552B

    MD5

    1abd16c2d9907813871ecd0114d9a11e

    SHA1

    c8d841a2f41f4608290d805ec235c54ec527e745

    SHA256

    c7c0b17182d656a2ec11d18b975fe20604457c614a7f802f7e355bff04478844

    SHA512

    12ba205df19d8838b9b2f970ebb2c2136defe41f8335424cd06d11594b4786bcdfe4663c7f9a15758b45062086e6c40b7949380d51425bb6f20dc5a324f70ee3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
    Filesize

    392B

    MD5

    10f7309dcf2ded4b773b6ba1f27b7095

    SHA1

    8303a8b74317b0aa928f584062d30fffd6e18e6f

    SHA256

    06c3dfbb60af106126ce6c696a96933d384d9acb79886c477046eb18a0ca29fe

    SHA512

    6919a743cff6dece5e7fccb275fe9c41796633c2890a43bf06d571079cdbfecd431ed42776e1c842af5cfa5a85475633438d5de2aa61f2d36a6b4bbc523476ab

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.355.3101\412172D9-30FC-4243-A91C-96802364043D\SodaPDFDesktop14.exe
    Filesize

    13.1MB

    MD5

    c9147af9fe0c0f9b3c412b917cc84bcf

    SHA1

    29d1bcb8af1370e1056221a6934879484d583cdf

    SHA256

    4d9f2e9d386176333d4e46ea979367cf3362f63d00905c19932a9d75f77379c0

    SHA512

    855618151344c4175a14d98f27f07c6ae01acfef08bb58c16e406262834f3198a2bd13543bdf67a1b7e1a5bd97e32080525d655939f9452256aae5b28aefddb4

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\89942D73-BCBB-454E-9576-7512C21FA7E4\SodaPDFDesktop14.exe
    Filesize

    11.4MB

    MD5

    20e10ef081421b68cc1ac6bda03a1ae2

    SHA1

    7a70c29307c1549ba474c9f4efd4ab8c34f6c34a

    SHA256

    eaa9a23b600ddf851bda95cba322cc8b4774eed57d56430ea8cd9414e48eb4e9

    SHA512

    36067f7577b65b3a5a875d1ba52dbb547766932961e6914edea527a2a514d04007906a90f771547293c917bc64b09d93373145c88fceea33542e5a874f2b2322