Analysis

  • max time kernel
    140s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 14:09

General

  • Target

    2024-06-19_f97df0290c94c1463dddaf8a67bb5ebc_avoslocker_magniber_metamorfo.exe

  • Size

    13.1MB

  • MD5

    f97df0290c94c1463dddaf8a67bb5ebc

  • SHA1

    0ecdea8ed6958ab7db0a2ed3302db4a170e76607

  • SHA256

    4b48513a92e036e695b87d6904b93d980f846583c5329b64ce6637b9980f9646

  • SHA512

    d6573e733fd46a2d937496358ff353812bbdaadb409e9fa6104178dbd5c9aa75de8ef6df94a794a50fdfc3344d6c098c827c2a6b7c6b0e24151389dd81514b78

  • SSDEEP

    196608:x16y1UicZXDmaEKCqtf6PaaLCtx+zFUlBbLrqN2aUQGXe2RKB:xrp0hUPaSfUBbLrqNb/GX6B

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 5 IoCs
  • Modifies registry class 46 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-19_f97df0290c94c1463dddaf8a67bb5ebc_avoslocker_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-19_f97df0290c94c1463dddaf8a67bb5ebc_avoslocker_magniber_metamorfo.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\5155D7B4-8E5E-48D9-B271-AE6313EE9871\SodaPDFDesktop14.exe
      "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\5155D7B4-8E5E-48D9-B271-AE6313EE9871\SodaPDFDesktop14.exe" /update=start /welcome
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\68DE476C-6E39-4DA2-A042-EBF46BB9914A\SodaPDFDesktop14.exe
        "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\68DE476C-6E39-4DA2-A042-EBF46BB9914A\SodaPDFDesktop14.exe" /update=finish /welcome
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3576
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:1136
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /welcome /no-check-updates
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:4252
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /CleanupTempFolder /ParentProcessId=3576
          4⤵
          • Executes dropped EXE
          PID:4988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Soda PDF Desktop 14\Installation\updates-info.json

    Filesize

    2KB

    MD5

    1d4656895ed985f5434b9efe71138e28

    SHA1

    9086ba60052b2a011713982592f3cf747805943e

    SHA256

    c7c2e3def23c167f42b379a13239adaa4b92f6d67435c67c65a32f7d81a3c275

    SHA512

    852aadf86f14bfb49bc4e9f86a36e2413985d521d482be4a6a79d006abfb6e416ad732fe5d973c7bc698119d16347864d49c64d5bb75d5b9cde4cfba31dfcfea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF

    Filesize

    812B

    MD5

    ec95ba152315371a12b61e59736ef2af

    SHA1

    5420ca8697ddefc184f61745f4737305a68a4e75

    SHA256

    55c56ef40fb19a4cf6d03acd5c5232286fe429d79e0f619701f32d51a5428198

    SHA512

    ecb8c92181c02083b06272b5d92acbbc51abcd3eee7e42e06d8df77fb2e4240d5fd2f5a1a084dc9c4f7945218fadc1f6a4532145c12dbc1887961cee79f19be9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    39d2df86165b0215641f766b13a55453

    SHA1

    593dfc5e31686afa173525525b869b2b3a91fbbf

    SHA256

    e321c9f3f910a89c7d84b4b8ca82e43378f0825f2a76cf23871afa65dfe423b5

    SHA512

    2d805e6118e1767ed074b36c2b2ae9a945fe03f31ec0e2c3299fbdb039b021c024b99682b627f28831e01804ed3b7037d42bb1fa8028dbe83791da5821a9e435

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D

    Filesize

    1KB

    MD5

    abb502b89a5cc550487d40f7cb34168a

    SHA1

    52c1d2ccc8191852271dc0fe37c60d52913d80cc

    SHA256

    24e6ea8274231669e3e7ca37b682e8597daff4da49a9a5acfefee0a82409f134

    SHA512

    c00bc69eb46ab2c6a69bcd823e33c38459d48d13df6ce6bb56722ae78fbcdeb482489c2fa86238872e788b1685b1816bc1f8291cd1f36bed46d969a3117fe522

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0

    Filesize

    806B

    MD5

    0ec4ed7e35df078fb986b9bc18112629

    SHA1

    fa32d92efd2b838fc8659cfa1fe6a928297437ef

    SHA256

    5018c6fb144ab6d2a029963322b96dd293d9bc4f20853124b74c97f0fd09acfc

    SHA512

    cb0e25cc8a2bfe7b037ccca5166115f39fb6acf2d5ac12bcbada1c5d65726871698675909671dc4e33b6c057cf1fac8555292e7a06ff7db7d74190391bfa8706

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF

    Filesize

    540B

    MD5

    09fd2de4faba7aa577afb1c6d9c8e4d3

    SHA1

    54f05ca913c37d5f54b7c107c2e1067c6fcfbcdc

    SHA256

    3f66490afdd700686c342dc27ddc13f84cec3709f80c59a061fc727a0bf1e2f1

    SHA512

    eb7a62dc2da5fab253c715d27bc15b1195c1014e69c799be8a30f731504f8e5f3507525f227bdfbe6b4be2fb2e624d715ce692815a65403bdf5edb40c4f7c419

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    caf7bfd11cbf2f6e6f6a5916e5d1735c

    SHA1

    8ae58ed7c00229266fd8a06a10bff2bd2dafe7e9

    SHA256

    dad6c7024503d87e900d4983f61a13a284f1b0fa0282b7f89401cc35cf2ad5fd

    SHA512

    d2e89a63c6b7231f5a1ef30f462e0c293851288ff386a79a270daf35faaa6e89bf4b2e38c8e3dd8d5a7079bd41e8a6d5107816f6c7a38c457f9cb74a568df6a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D

    Filesize

    528B

    MD5

    6f976af1556096a3102d4a7165c473cc

    SHA1

    4a5dddfdb1b0dd124c6578f6d1f9e038da09ec97

    SHA256

    2cb907d5f9c08ffa12465b3829afccf9b834b0cf2c8367f614848557bdce5576

    SHA512

    def0bf2a2478dc7dd05a3d76acc47102bb9d52583c2b18f7c373c4bf0dba6b6e8d2aec4c1e72e59549e4508bfcb1c06e4c701c5f8e45cec2756e7a648963e7b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0

    Filesize

    552B

    MD5

    5146edadae2063b21d83baa0f64d37fb

    SHA1

    ad10ded0216ebc8b62ccd1c597c8b0a274b859ea

    SHA256

    509bccb85b65d1a75f306df18175df043de0e177fb1947d6f3e4d3b9596ea1c8

    SHA512

    c603a12379684b6f88f89b755430e72df342c224788d3a110bc936103c66c39a913826ba2575e9cbcdc6882ab8988c1d7f6ee74d133936524f33051c7a1aa300

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    80b8a6f3957351e274897162e7ad39ac

    SHA1

    a24b4ea8e83eb57bcd8595905fd73526a46b38e8

    SHA256

    6cc8367424dc29184b1f19cc99bc06dca7ed983d66a3d710f5a8c5689da99cbb

    SHA512

    3b9bf5747664957ac5ef5b7ff93d758ab8381d7fc5f604c2a8d0dc14394ebc5a5ddeacc7decfa6ce2d59d8f3c1af91a794a68f8e130ea71d26d123f7298da049

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\5155D7B4-8E5E-48D9-B271-AE6313EE9871\SodaPDFDesktop14.exe

    Filesize

    13.1MB

    MD5

    f97df0290c94c1463dddaf8a67bb5ebc

    SHA1

    0ecdea8ed6958ab7db0a2ed3302db4a170e76607

    SHA256

    4b48513a92e036e695b87d6904b93d980f846583c5329b64ce6637b9980f9646

    SHA512

    d6573e733fd46a2d937496358ff353812bbdaadb409e9fa6104178dbd5c9aa75de8ef6df94a794a50fdfc3344d6c098c827c2a6b7c6b0e24151389dd81514b78

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\68DE476C-6E39-4DA2-A042-EBF46BB9914A\SodaPDFDesktop14.exe

    Filesize

    11.4MB

    MD5

    f1261832a0f70dd8cad561680aa2ae23

    SHA1

    5ec6186f235bfd106d619127584504289b05e464

    SHA256

    765b2aafed9b64dbc93b5027aaa2f281d163ed763efa0574d9bba69494d7795a

    SHA512

    6f0cb24e0aeefc6e525acd17089210639cf4b080112da9d0be73afbca4a46c4b4f896159c4821d06f9e0d94e5b896f0609664ed8697a24152359323bbfe3842f