Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 04:29

General

  • Target

    f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe

  • Size

    4.6MB

  • MD5

    006906e22d359fd41a49524107e75e86

  • SHA1

    38b53730d765adcda518b481f1ab5d3024957af8

  • SHA256

    f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3

  • SHA512

    63fef8cf255985dfa94c7eaa9892c8268f2bd10ca752f3f9fae6629dc24ff840dcef7c9c2ff5d3f80db0fda17f93708cbcf840fdcf636f40012ca2ea31b5fe4f

  • SSDEEP

    98304:cnsmtk2aguMhd86B7UgpBClmo+V/kjIynMqaSGd2bZ1SzZ:yLdu/6p3Clmou/S7ngtRZ

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe
    "C:\Users\Admin\AppData\Local\Temp\f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\._cache_f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:1988
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
            PID:2328
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            3⤵
              PID:4040
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              3⤵
                PID:3420
            • C:\ProgramData\Synaptics\Synaptics.exe
              "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4916
              • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2768
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  4⤵
                    PID:2476
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    4⤵
                      PID:1980

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\Synaptics\Synaptics.exe

                Filesize

                4.6MB

                MD5

                006906e22d359fd41a49524107e75e86

                SHA1

                38b53730d765adcda518b481f1ab5d3024957af8

                SHA256

                f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3

                SHA512

                63fef8cf255985dfa94c7eaa9892c8268f2bd10ca752f3f9fae6629dc24ff840dcef7c9c2ff5d3f80db0fda17f93708cbcf840fdcf636f40012ca2ea31b5fe4f

              • C:\Users\Admin\AppData\Local\Temp\._cache_f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe

                Filesize

                3.9MB

                MD5

                6604a47d10c94c942dec1fca54d3eb05

                SHA1

                5ffd9c0ee6ea01f71cfa64c26afe11f2f375d14b

                SHA256

                2c5345c08e558e398a92a272b5897cd27d44bbcfc6dc70edadc0ea474d0bba1f

                SHA512

                b3f7c3196ea46364f39ca83d0082b658b2d05d33b6f3b2bd1265a1259ad1e4d560f3ef44887696a1689cebf3c32b69ac401b8b652f0f556aeeaba49eb132924f

              • memory/224-242-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-197-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-71-0x0000000000910000-0x0000000000CFE000-memory.dmp

                Filesize

                3.9MB

              • memory/224-238-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-130-0x0000000005960000-0x0000000005BA0000-memory.dmp

                Filesize

                2.2MB

              • memory/224-236-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-198-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-129-0x00000000723E0000-0x0000000072B90000-memory.dmp

                Filesize

                7.7MB

              • memory/224-137-0x0000000006CD0000-0x0000000006EF4000-memory.dmp

                Filesize

                2.1MB

              • memory/224-138-0x0000000001690000-0x00000000016AC000-memory.dmp

                Filesize

                112KB

              • memory/224-256-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-200-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-260-0x00000000723E0000-0x0000000072B90000-memory.dmp

                Filesize

                7.7MB

              • memory/224-202-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-254-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-253-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-250-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-234-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-246-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-244-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-204-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-240-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-79-0x00000000057C0000-0x000000000585C000-memory.dmp

                Filesize

                624KB

              • memory/224-61-0x00000000723EE000-0x00000000723EF000-memory.dmp

                Filesize

                4KB

              • memory/224-248-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-232-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-230-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-228-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-226-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-224-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-222-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-220-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-218-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-216-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-214-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-212-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-210-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-208-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/224-206-0x0000000001690000-0x00000000016A5000-memory.dmp

                Filesize

                84KB

              • memory/3016-0-0x0000000002850000-0x0000000002851000-memory.dmp

                Filesize

                4KB

              • memory/3016-133-0x0000000000400000-0x00000000008A9000-memory.dmp

                Filesize

                4.7MB

              • memory/3420-259-0x0000000000400000-0x0000000000596000-memory.dmp

                Filesize

                1.6MB

              • memory/3420-257-0x0000000000400000-0x0000000000596000-memory.dmp

                Filesize

                1.6MB

              • memory/4916-134-0x0000000002410000-0x0000000002411000-memory.dmp

                Filesize

                4KB

              • memory/4916-326-0x0000000002410000-0x0000000002411000-memory.dmp

                Filesize

                4KB