Analysis

  • max time kernel
    92s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2024 13:23

General

  • Target

    2024-07-04_0fa077a0a32ed396bb5a053ed013a7b1_avoslocker_magniber_metamorfo.exe

  • Size

    13.1MB

  • MD5

    0fa077a0a32ed396bb5a053ed013a7b1

  • SHA1

    35c9fe756e3f4c5411221d5887ae6332fc6fbdf7

  • SHA256

    498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae

  • SHA512

    9d567933f69ac0b9cc6ee9325a3f62785d99b209077dadc4e8ed4176e39dde0014ca4f87e40084110202ab1c7aaf88a5129e82b167d40a816c641cf9687f2791

  • SSDEEP

    196608:G16y1UicZXDmaEKCqtf6PaaLCtx+zFUlBbLrqN3aUQGXM2RKR:Grp0hUPaSfUBbLrqNq/GX8R

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 5 IoCs
  • Modifies registry class 46 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-04_0fa077a0a32ed396bb5a053ed013a7b1_avoslocker_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-04_0fa077a0a32ed396bb5a053ed013a7b1_avoslocker_magniber_metamorfo.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\E299074F-2A0F-4166-9B26-4B4B91FB3AB0\SodaPDFDesktop14.exe
      "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\E299074F-2A0F-4166-9B26-4B4B91FB3AB0\SodaPDFDesktop14.exe" /update=start /welcome
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\B6A39C7D-BCD9-44F6-9C6C-4C4E8B6290C8\SodaPDFDesktop14.exe
        "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\B6A39C7D-BCD9-44F6-9C6C-4C4E8B6290C8\SodaPDFDesktop14.exe" /update=finish /welcome
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:5016
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /welcome /no-check-updates
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:3904
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /CleanupTempFolder /ParentProcessId=4460
          4⤵
          • Executes dropped EXE
          PID:440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Soda PDF Desktop 14\Installation\updates-info.json

    Filesize

    2KB

    MD5

    c4b5a218a102e8b0161d38808890be4a

    SHA1

    de82199bae48c5ea9ceb4a6fac6091a021048370

    SHA256

    c630914cd475444c03d106ffe37353707bd1fe00b07e8be4f354a597031218af

    SHA512

    1bb951c65d9b32f12a1004658f09209e26e13734f7be6e8a06ce8d09079fd838850e0e65d83ad746a0785dc36fcd7dd449ddb796e1fc9679404dea7e8d2eb1f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF

    Filesize

    812B

    MD5

    c930736f83fb0cd4c01787bb61d2a04b

    SHA1

    d27c3ff1a3aa66e33fec1ce6fa4f67f58946637c

    SHA256

    643eda261db1c399eb61f8b90246037604ab319118ee648d06be862be2677859

    SHA512

    12c640e68d15bf49924454fa147876d41500aabbbc4ab02f975b8f521c637ad2212c07263d9048f7d38bae3468865a485015f09921293a424aa9902208fa7abf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    86bb172ab3c986a54a0373153e43197f

    SHA1

    beea12ea71bf37ac043450e9f9c2139cbffc33a1

    SHA256

    1876762e64b1211645b45cee74440f9218c80035a554b3876898e8676f414d57

    SHA512

    5a1071e1b12ea7e5833c7dbdde94d38b395495aef099684f1ce7948bedff7a04afaf55868542bd58db8084e2e0158cea18e456c384b3b6152f1004d4cc96219b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D

    Filesize

    1KB

    MD5

    84592dbd82fed2f5ea2a2fb75378db3a

    SHA1

    b9759e2398fad2357d00364239a10ae04a9c6017

    SHA256

    2c431f1f6f696e625f4d57b5cbf654eba3f4f167c61851d734b419d1f6f7cc50

    SHA512

    81c2a7d41c983287700b99edac97d3200d634365d1aff2518e208dbecec2d794630240697850ce828f19e2b47126545fa6436db5258f88f9f774f91ac25be981

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0

    Filesize

    806B

    MD5

    043c03344950c19eb36ef38da79416af

    SHA1

    b3dbbf59c63d5396f60313a048efc9c163d2d047

    SHA256

    a30942371f6238ba947a1096a495f6c841ca4c0ec6eb7306695c8c1952b6869a

    SHA512

    f41c6e9d58affcb0220882a36d88bfac77684114a6f6a7d01be8cba9cdb3e457856a0276cd291e9863c03c96d4d3848bd6d0c1f1e882e40bf43eafa0d61d9ffb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF

    Filesize

    540B

    MD5

    00a0f3fae726e66bb3c93ea4ac7cb126

    SHA1

    21835797bc2d19e04dd7acf81514170d507c7fab

    SHA256

    92372fc8a9b0fc13e0c7c1c5841504360851cb143af045be43ab04515d3aef72

    SHA512

    61b0238e98c0bc40ba969821218de1a16ec3191780083b700490176f62ad189858018ce3b12192c55c5a81b540c0d2a8eec1ad87fab0a8077c8edbb73cb9603a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    d3ac159070558f60ff514ea261abcb2a

    SHA1

    30089a2fb7cf4a61097895fdc6777484f907a968

    SHA256

    d283dfe9ce72d5220f8392b81d3f5bbff83db884b82a59c65cfedef199595b42

    SHA512

    7d7009abfbf228a1a760f3a65243c08b569e5c6742a8e6c0b4b3434f157e7cecdefbab66b880b621c84d6059596b0d56a62c0fea3a79b92e01d75ddfa29e2c10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D

    Filesize

    528B

    MD5

    2a75bc6b02b1762d98adc22bfcebfc71

    SHA1

    d1528b9e448c2b3aaaa2df27efd3e0f3c3de1347

    SHA256

    e88d69555447db9646fc5066ce7fb816c1df4a8fdaa70941ec46909d752901ca

    SHA512

    dabddf911e63cc9a0b9d762efc9b4e64c662c6afd55baa4cb9108449335db1692d8a7da4c020167ebee5d39911f5e80a6f8ed697be457317bef66d0213bf9ac2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0

    Filesize

    552B

    MD5

    7758e8341550a6a4720787c292dca3f5

    SHA1

    58ef8608793007fc72f9a5b03112933a7027d6fa

    SHA256

    26a6dec71963ceff7bfefaa78ea8c401f3364ffb476d0240a7b98a0bb2baea7c

    SHA512

    791dbd97817e7111a3f15dd2180084b8b3c0303a3d6f415c31db10643a37287d285c1e404d29ce10937529ec985619f9e9a59900464a1fea554305aac6f7b412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    31b0770b67d28f0efa2a8d2fb7549cb6

    SHA1

    a2edd2f6ea3f9b28d8e6383c87ff98798f696016

    SHA256

    82ddf566c4f14fa641f21133ce8e6c5d8e87decbf279120b0b29be446943203e

    SHA512

    5d227781b14b6b8e7cf8f6adbc5d4b3efd5ff7afd36d68a4981f604e20fc31e1377154b21558e9c78a15ab22b91e115aa8fdecb3aba93d730ba4441772ba52e9

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\E299074F-2A0F-4166-9B26-4B4B91FB3AB0\SodaPDFDesktop14.exe

    Filesize

    13.1MB

    MD5

    0fa077a0a32ed396bb5a053ed013a7b1

    SHA1

    35c9fe756e3f4c5411221d5887ae6332fc6fbdf7

    SHA256

    498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae

    SHA512

    9d567933f69ac0b9cc6ee9325a3f62785d99b209077dadc4e8ed4176e39dde0014ca4f87e40084110202ab1c7aaf88a5129e82b167d40a816c641cf9687f2791

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\B6A39C7D-BCD9-44F6-9C6C-4C4E8B6290C8\SodaPDFDesktop14.exe

    Filesize

    11.4MB

    MD5

    13867ab60e71359f49c3683f20306fc9

    SHA1

    2452a479490a8c677e399c6b7aca83170bf89c85

    SHA256

    d9b5042d60f5f9793fe6530587c2ea72e2c11a792f985472c96e1f6ba95dd1c5

    SHA512

    8e3f56a63c1348b350efb144964081cd5033f72e55681405b1b3acfe4e782779b3b0e99733b925393358d2a56f45a5eb268731b0991b8209635cee847ef0fdcf