Analysis

  • max time kernel
    118s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 13:23

General

  • Target

    2024-07-04_0fa077a0a32ed396bb5a053ed013a7b1_avoslocker_magniber_metamorfo.exe

  • Size

    13.1MB

  • MD5

    0fa077a0a32ed396bb5a053ed013a7b1

  • SHA1

    35c9fe756e3f4c5411221d5887ae6332fc6fbdf7

  • SHA256

    498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae

  • SHA512

    9d567933f69ac0b9cc6ee9325a3f62785d99b209077dadc4e8ed4176e39dde0014ca4f87e40084110202ab1c7aaf88a5129e82b167d40a816c641cf9687f2791

  • SSDEEP

    196608:G16y1UicZXDmaEKCqtf6PaaLCtx+zFUlBbLrqN3aUQGXM2RKR:Grp0hUPaSfUBbLrqNq/GX8R

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-04_0fa077a0a32ed396bb5a053ed013a7b1_avoslocker_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-04_0fa077a0a32ed396bb5a053ed013a7b1_avoslocker_magniber_metamorfo.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\EB7D6489-BE22-4287-B0AF-DCF7DAB2E61D\SodaPDFDesktop14.exe
      "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\EB7D6489-BE22-4287-B0AF-DCF7DAB2E61D\SodaPDFDesktop14.exe" /update=start /welcome
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    86bb172ab3c986a54a0373153e43197f

    SHA1

    beea12ea71bf37ac043450e9f9c2139cbffc33a1

    SHA256

    1876762e64b1211645b45cee74440f9218c80035a554b3876898e8676f414d57

    SHA512

    5a1071e1b12ea7e5833c7dbdde94d38b395495aef099684f1ce7948bedff7a04afaf55868542bd58db8084e2e0158cea18e456c384b3b6152f1004d4cc96219b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    70b86d38131596452a2e17071e8a92c3

    SHA1

    fa14cd6f9750bbc241a9555e868b1021ecbcf0ae

    SHA256

    a1e15f096a2f6382f74df1e657d399ac4e3fc4598262a8e447aee7794b9a0f4f

    SHA512

    e9e981c44c8159b2c8cb3dc58c8325a616974d91d63186363ca70d5bc3f9a9919b993be51ddfd5e305d61389230bede6f89066761a2aa8869dc009feb41297a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    628697ae8700c578067f58f6d1af19a1

    SHA1

    568031df659bd2d9efbb45438cb15a6dc9df7090

    SHA256

    aa6bc47423097bbcfae77b6adcf18ab1c6668bf9b4ad5b4d7822fc014920ebf9

    SHA512

    f31e34cc54a0de72b5e9be4c035f64c984436442fc16023cf8bca725b0acdb2622a4e1bb53aea975c4144c08c92d574137ebcdcb6fe14becf86faba0ff550b4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    521294b29e7454730384b8623304faa0

    SHA1

    243e6eac5832b5f10e338e6d009e208fee76fdf5

    SHA256

    16a43b6ec2cf20dc8301f716115237b724819f3474a9dbc1a1b03e47aa49da6d

    SHA512

    cb24f43d781ac592717cc2db8d19b8af50baeec68d8281b3776ed38dc4dfef1c14aaf849b661e4e33be6edf0b041388b348a9f3a2c2d305cdd22ed23078a5150

  • C:\Users\Admin\AppData\Local\Temp\Cab707F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7D1F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\EB7D6489-BE22-4287-B0AF-DCF7DAB2E61D\SodaPDFDesktop14.exe

    Filesize

    13.1MB

    MD5

    0fa077a0a32ed396bb5a053ed013a7b1

    SHA1

    35c9fe756e3f4c5411221d5887ae6332fc6fbdf7

    SHA256

    498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae

    SHA512

    9d567933f69ac0b9cc6ee9325a3f62785d99b209077dadc4e8ed4176e39dde0014ca4f87e40084110202ab1c7aaf88a5129e82b167d40a816c641cf9687f2791