General
-
Target
archive_3hc.rar
-
Size
8.8MB
-
Sample
240614-p28z9a1fjc
-
MD5
b659e40fa008a288ddd3cde323ba6301
-
SHA1
78e3c3cd6f4603d3eba7e74ddfb9a10d2d059532
-
SHA256
b7642a6b4604a036661c77e129d89794023dcab97b3f77a73dbad356fe61d9ad
-
SHA512
be1d98d09b185c20f4515823c64f4729d14d92b8d58b09f3bc554d191332e6d385bf2d09dd92148e5bd5ffcb3d680850d5b4b36103e8363fc0c299c3f2cdfedb
-
SSDEEP
196608:EbjGZMBzUluuJFaD5KiKXKh1lX+WgCZdewHaETSP3m4FrKz:EPXBzUcMhlah1JldUwH3TSP3rFra
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
risepro
147.45.47.126:58709
Targets
-
-
Target
setup.exe
-
Size
770.0MB
-
MD5
2c53438c49053ca4527fba68d896c6e5
-
SHA1
0d00c3991548b6e4fd17cd223271e0a15cb7e84a
-
SHA256
912a6f22b8f39b437711afda5c7b7c1f6590f77330cdb6e92ac1294459802fff
-
SHA512
1b22f804af98dbd6f7c7eb948bb30a0e8c3c17b37f42f3f907913427a09998e611f720a224b60c740e7eb8324fb479f50d5bdc097cef2ff04748a78561842536
-
SSDEEP
49152:gwVVDUleHEr/Fx2xA+5aSwXtnohOIAynnSueGngj976RCfMyaiJuz4hg3:g0V4lrr9x2+G0WOIAynSueGgjNBbKsh
-
Modifies firewall policy service
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Blocklisted process makes network request
-
Creates new service(s)
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Create or Modify System Process
3Windows Service
3Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
1Modify Registry
7Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1