Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 10:30

General

  • Target

    2024-07-04_767e55cae732d423fe44d31f3cfd8203_avoslocker_magniber_metamorfo.exe

  • Size

    13.1MB

  • MD5

    767e55cae732d423fe44d31f3cfd8203

  • SHA1

    30efbec5ca6063b85c11563f34b489784fea8377

  • SHA256

    6442f25eb20706d2ca238115f7d23985fc6f5dde33d4489f8c434ad73c79b106

  • SHA512

    a4c1aa46e067f5d1fc165db9ce30dc6be3b5973a47e00f013165b6d79c02bf4eb2c9c720270f8b15ea66ce641c23f735c5b856888e3a4dde94ae1863ef0d3b46

  • SSDEEP

    196608:016y1UicZXDmaEKCqtf6PaaLCtx+zFUlBbLrqNkaUQGX62RKk:0rp0hUPaSfUBbLrqNd/GXOk

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-04_767e55cae732d423fe44d31f3cfd8203_avoslocker_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-04_767e55cae732d423fe44d31f3cfd8203_avoslocker_magniber_metamorfo.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\F35880F2-F1F2-4C9F-8EED-BF8352629720\SodaPDFDesktop14.exe
      "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\F35880F2-F1F2-4C9F-8EED-BF8352629720\SodaPDFDesktop14.exe" /update=start /welcome
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    c4e3cfa5c1425cfbbb298bc381472056

    SHA1

    d1a9dec8e456fc19781abffedc9ff8dd0d053270

    SHA256

    e96589fc158131bbe8c9e14640b5f24b8d0eb4a18d2a1a535ab28fbcfe35099a

    SHA512

    cb2641504caaef72dda73a3acbf26ac2a18d14c78ee5c490a5a913d27a5de5b619d336b2f93e719abd55824e912493167819d80208c7b5c31e533f8f13044fa7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    0fd53f78feae9bd8fb1fd4be464aa573

    SHA1

    381f061e3ee21d2d7c4ae67d09f8e5fe9f77fc01

    SHA256

    87b5c17fa6bca03ff0784ecab410bdadd2113342880ff29c3213608a04eff06a

    SHA512

    b2a24608234a0465c3f413379a4e4899497693963a325e400f7a1692adcf9d5f67ac3bd5dbe970da98387d270b5c2f72d0d4f1bb96448239cec553e1f789e390

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf9420f4cf08743a41a2fe15528ae519

    SHA1

    96aa5e71fc0262ed9e137d41d44bcbe7d1f18085

    SHA256

    1b099475ba35a482ffd8b78a295bf25b8948f8b4140160005f82824238d61bcc

    SHA512

    a7e984233b57bee10d0be6ff6bd6e0d6ab35c5e929b69960244297b44e0f7ff607903933d0bd4fe3200cddbf45bb6d78c7a91d4eb0e8fc4d7b41ece56bb2190e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    2cee2b49b8c916fc59311c6a829a33b0

    SHA1

    b5c53921a39f531b2fca0c04815478d340f47515

    SHA256

    98be10555bd1c8783265c626868dc51c208b5ae23ad05574575b64ee76b1e6f8

    SHA512

    40663a60d26f6527793759e95e8a70b167f41a65487b346e96e98f113d0f9c25ca08fb6c619e728525bf943ef673ad85b0d5b7525f70c7209450825037007f2d

  • C:\Users\Admin\AppData\Local\Temp\Cab3E48.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\F35880F2-F1F2-4C9F-8EED-BF8352629720\SodaPDFDesktop14.exe

    Filesize

    13.1MB

    MD5

    767e55cae732d423fe44d31f3cfd8203

    SHA1

    30efbec5ca6063b85c11563f34b489784fea8377

    SHA256

    6442f25eb20706d2ca238115f7d23985fc6f5dde33d4489f8c434ad73c79b106

    SHA512

    a4c1aa46e067f5d1fc165db9ce30dc6be3b5973a47e00f013165b6d79c02bf4eb2c9c720270f8b15ea66ce641c23f735c5b856888e3a4dde94ae1863ef0d3b46

  • C:\Users\Admin\AppData\Local\Temp\Tar44B1.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar468F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b