Analysis

  • max time kernel
    93s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2024 10:30

General

  • Target

    2024-07-04_767e55cae732d423fe44d31f3cfd8203_avoslocker_magniber_metamorfo.exe

  • Size

    13.1MB

  • MD5

    767e55cae732d423fe44d31f3cfd8203

  • SHA1

    30efbec5ca6063b85c11563f34b489784fea8377

  • SHA256

    6442f25eb20706d2ca238115f7d23985fc6f5dde33d4489f8c434ad73c79b106

  • SHA512

    a4c1aa46e067f5d1fc165db9ce30dc6be3b5973a47e00f013165b6d79c02bf4eb2c9c720270f8b15ea66ce641c23f735c5b856888e3a4dde94ae1863ef0d3b46

  • SSDEEP

    196608:016y1UicZXDmaEKCqtf6PaaLCtx+zFUlBbLrqNkaUQGX62RKk:0rp0hUPaSfUBbLrqNd/GXOk

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 5 IoCs
  • Modifies registry class 46 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-04_767e55cae732d423fe44d31f3cfd8203_avoslocker_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-04_767e55cae732d423fe44d31f3cfd8203_avoslocker_magniber_metamorfo.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\D09BC76E-65C1-4BFF-83AE-AA9798EA976C\SodaPDFDesktop14.exe
      "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\D09BC76E-65C1-4BFF-83AE-AA9798EA976C\SodaPDFDesktop14.exe" /update=start /welcome
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4908
      • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\38105F28-0FF9-414D-BD38-C90D46C4EE73\SodaPDFDesktop14.exe
        "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\38105F28-0FF9-414D-BD38-C90D46C4EE73\SodaPDFDesktop14.exe" /update=finish /welcome
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4200
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:4752
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /welcome /no-check-updates
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2056
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /CleanupTempFolder /ParentProcessId=4200
          4⤵
          • Executes dropped EXE
          PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Soda PDF Desktop 14\Installation\updates-info.json

    Filesize

    2KB

    MD5

    05895386230583ad5a2550f6437f42b2

    SHA1

    b716bed83bb078aa45cd2145b6589dea6e1f3857

    SHA256

    a146ff557be6e3e0a17612df9df7ddda50d8ebfab29de7c384b22c4e43453343

    SHA512

    d1f11713575e7f11c52c362ce5e496fff0f97d7eba09c4cffbc40889f60f192b924a93c20a6aa992ef7fd50406f3b4ae561891f1f0fb2967e33e3fcf30fd3151

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF

    Filesize

    812B

    MD5

    c930736f83fb0cd4c01787bb61d2a04b

    SHA1

    d27c3ff1a3aa66e33fec1ce6fa4f67f58946637c

    SHA256

    643eda261db1c399eb61f8b90246037604ab319118ee648d06be862be2677859

    SHA512

    12c640e68d15bf49924454fa147876d41500aabbbc4ab02f975b8f521c637ad2212c07263d9048f7d38bae3468865a485015f09921293a424aa9902208fa7abf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    c4e3cfa5c1425cfbbb298bc381472056

    SHA1

    d1a9dec8e456fc19781abffedc9ff8dd0d053270

    SHA256

    e96589fc158131bbe8c9e14640b5f24b8d0eb4a18d2a1a535ab28fbcfe35099a

    SHA512

    cb2641504caaef72dda73a3acbf26ac2a18d14c78ee5c490a5a913d27a5de5b619d336b2f93e719abd55824e912493167819d80208c7b5c31e533f8f13044fa7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D

    Filesize

    1KB

    MD5

    25b47cd140794abed237615d1e189cd6

    SHA1

    03665aa55fdc8a93a8c69b647f83c11968f48bf9

    SHA256

    51f4f3c33c90f7a75f0860e017773329a20d57b11ceb182330d6c189e4a30e77

    SHA512

    98e98a9a37d61b4b52cb4f6b874d8d6a32712c6a6b0cafa419ea410bcb6e7922838c7c625c5412fda4ec9e51bfda55f4ed4aad7c56398f38bcf9b69c778c8c5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0

    Filesize

    806B

    MD5

    043c03344950c19eb36ef38da79416af

    SHA1

    b3dbbf59c63d5396f60313a048efc9c163d2d047

    SHA256

    a30942371f6238ba947a1096a495f6c841ca4c0ec6eb7306695c8c1952b6869a

    SHA512

    f41c6e9d58affcb0220882a36d88bfac77684114a6f6a7d01be8cba9cdb3e457856a0276cd291e9863c03c96d4d3848bd6d0c1f1e882e40bf43eafa0d61d9ffb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF

    Filesize

    540B

    MD5

    c30e29bc473440e22bd680648b0c9391

    SHA1

    6250a14e5b3119a479833dad07ac49d024b6af10

    SHA256

    953b31d179362c0ea1bf3ac003de43122d3515ea01396d5f4a067bcb2c5eb3dc

    SHA512

    183ada39db5fa69bc5f0d22f7aa2be4278cac213a85de8b364b0bb3ee76343e44f94e140b8d6d42cc57c51d1f138d86ded733dbc9cc8f3c24e5053ffa54887c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    1d6674843789246cf61bfed203014033

    SHA1

    abb1b5eca603911c4b14b29ed343f82e5b0fc4ce

    SHA256

    11e0b87aa3bae0cadcb45226ad0a6b4427c8e47b4f7f257c89976771a2031bc0

    SHA512

    8266ae1219257faf2fdac62e8440dbc12a9b89d584707e2dd7d136504ae2ff654a21ad0bda39bb45ec11c73c446642b6aaa401d6f9773adc7783b69c448c94c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D

    Filesize

    528B

    MD5

    e56fa14aab1528c50c4f5bbeb04f3b6d

    SHA1

    cb1fa91e7b12e37c4afd4bd1ed4378876fe16425

    SHA256

    ad7cf4acef9522fcac2d19bce2e0966466801f0295272a9809270070acc559eb

    SHA512

    cb92b804417ed7ed3288c0dccb448c47c9a4136925d1aebd9d98c98c13bc7ad666aa9a211ad8ef86f96bbf42a0f7f2adb23425d29d2a5ce0fc1bfbe029186af1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0

    Filesize

    552B

    MD5

    63a16203e997f141ef209d18d2aae954

    SHA1

    4ac69219feeba9030fa7c3a7517020ec45c7c37d

    SHA256

    d1095763bfd2e1c6b1000f850a8e526fc75ad90c61a76dc3fdb048d028b3aeaa

    SHA512

    352bb4b46307ab52e19c9681985cbe8e17a86d42a9631658190f5625e0d295b4539a2a51f30a2f1d4002d5a1355b0d28eb78efaab5a5d83a7c7af8624737dbb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    7965b82472293e346ba65c5b2b820524

    SHA1

    899b31122270deda25d0c73dc506ea307bf1bf86

    SHA256

    d7c03cd33cca69c55f9fa864af75ece1f3e43aef88cfd1b1d26c722e5c780be4

    SHA512

    12763ff831fa1b29938e7e3caaccb7b58168b8691337f5c83eaeac1ab3a689c7c4b55023ec8e7b9d1b8da45afe171a7ffb84722e6aad3fdc91c218a750a0bf9a

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\D09BC76E-65C1-4BFF-83AE-AA9798EA976C\SodaPDFDesktop14.exe

    Filesize

    13.1MB

    MD5

    767e55cae732d423fe44d31f3cfd8203

    SHA1

    30efbec5ca6063b85c11563f34b489784fea8377

    SHA256

    6442f25eb20706d2ca238115f7d23985fc6f5dde33d4489f8c434ad73c79b106

    SHA512

    a4c1aa46e067f5d1fc165db9ce30dc6be3b5973a47e00f013165b6d79c02bf4eb2c9c720270f8b15ea66ce641c23f735c5b856888e3a4dde94ae1863ef0d3b46

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\38105F28-0FF9-414D-BD38-C90D46C4EE73\SodaPDFDesktop14.exe

    Filesize

    11.4MB

    MD5

    9917f5a1478ae346d38bf0a20728d665

    SHA1

    9bdd8ac7112a32e4172b43bd447b989607dee3b6

    SHA256

    0df854fd54996e0124d76db9a13f22758298d96af5fb28c98ae8a4420779b744

    SHA512

    36aeae8a14bc3c8489cfda530e02a114fa4d789acd5252c1f1f9095a39e00ea6e2cdf9ab0cffee90041c2f7c2d7ab4009be8756f8816e83f7bebc412e64673da