Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2024 13:35

General

  • Target

    498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae.exe

  • Size

    13.1MB

  • MD5

    0fa077a0a32ed396bb5a053ed013a7b1

  • SHA1

    35c9fe756e3f4c5411221d5887ae6332fc6fbdf7

  • SHA256

    498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae

  • SHA512

    9d567933f69ac0b9cc6ee9325a3f62785d99b209077dadc4e8ed4176e39dde0014ca4f87e40084110202ab1c7aaf88a5129e82b167d40a816c641cf9687f2791

  • SSDEEP

    196608:G16y1UicZXDmaEKCqtf6PaaLCtx+zFUlBbLrqN3aUQGXM2RKR:Grp0hUPaSfUBbLrqNq/GX8R

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 5 IoCs
  • Modifies registry class 46 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae.exe
    "C:\Users\Admin\AppData\Local\Temp\498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4072
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\A7117DA5-F5D9-4BF7-9BEC-778CE08104A3\SodaPDFDesktop14.exe
      "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\A7117DA5-F5D9-4BF7-9BEC-778CE08104A3\SodaPDFDesktop14.exe" /update=start /welcome
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5056
      • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\752FCD8E-073C-4D97-8615-1FBE392B9DD6\SodaPDFDesktop14.exe
        "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\752FCD8E-073C-4D97-8615-1FBE392B9DD6\SodaPDFDesktop14.exe" /update=finish /welcome
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:4036
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /welcome /no-check-updates
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2848
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /CleanupTempFolder /ParentProcessId=2776
          4⤵
          • Executes dropped EXE
          PID:208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Soda PDF Desktop 14\Installation\updates-info.json

    Filesize

    2KB

    MD5

    92a2e537170cd23ff1f2d4f4f969f745

    SHA1

    8a6385558dadb56c2ac57f8129a3f9b84e9c723a

    SHA256

    d60706611383bf32e5d6527633e0691ce7a4862ca3f08578b336813afaa14163

    SHA512

    a7ef2d578449a1013b562a00023d4edf18b20e7d1b234e68448a4d72f34013dabfdeb80844bd74d30b43947309fcddd880d0b46db41c81f0d7b1045c28510e5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF

    Filesize

    812B

    MD5

    c930736f83fb0cd4c01787bb61d2a04b

    SHA1

    d27c3ff1a3aa66e33fec1ce6fa4f67f58946637c

    SHA256

    643eda261db1c399eb61f8b90246037604ab319118ee648d06be862be2677859

    SHA512

    12c640e68d15bf49924454fa147876d41500aabbbc4ab02f975b8f521c637ad2212c07263d9048f7d38bae3468865a485015f09921293a424aa9902208fa7abf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    86bb172ab3c986a54a0373153e43197f

    SHA1

    beea12ea71bf37ac043450e9f9c2139cbffc33a1

    SHA256

    1876762e64b1211645b45cee74440f9218c80035a554b3876898e8676f414d57

    SHA512

    5a1071e1b12ea7e5833c7dbdde94d38b395495aef099684f1ce7948bedff7a04afaf55868542bd58db8084e2e0158cea18e456c384b3b6152f1004d4cc96219b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D

    Filesize

    1KB

    MD5

    84592dbd82fed2f5ea2a2fb75378db3a

    SHA1

    b9759e2398fad2357d00364239a10ae04a9c6017

    SHA256

    2c431f1f6f696e625f4d57b5cbf654eba3f4f167c61851d734b419d1f6f7cc50

    SHA512

    81c2a7d41c983287700b99edac97d3200d634365d1aff2518e208dbecec2d794630240697850ce828f19e2b47126545fa6436db5258f88f9f774f91ac25be981

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0

    Filesize

    806B

    MD5

    043c03344950c19eb36ef38da79416af

    SHA1

    b3dbbf59c63d5396f60313a048efc9c163d2d047

    SHA256

    a30942371f6238ba947a1096a495f6c841ca4c0ec6eb7306695c8c1952b6869a

    SHA512

    f41c6e9d58affcb0220882a36d88bfac77684114a6f6a7d01be8cba9cdb3e457856a0276cd291e9863c03c96d4d3848bd6d0c1f1e882e40bf43eafa0d61d9ffb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF

    Filesize

    540B

    MD5

    4d6769d9fb7da10f16488bcc0d36871c

    SHA1

    e6feb219556a61dafda78af03dc2a1389c1bc2b3

    SHA256

    d83fd8d17e89dc5e378f382e8d23b12091961b51ae64031abadd01aac58c3800

    SHA512

    a5ebe3fafab78aee41d70b39270785d7601bfce670996c21d2e3bf86168c8adfdea903b76901ef42cc5ba36c502abbba9d0288f106263fe7d07b13705de0d109

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    eded7e679f180b721dd214d0a00627f8

    SHA1

    ab935e8a53f4ebb1c189eaac357e4769ac02fd98

    SHA256

    0a0b866a005f8faa2f7b2e610f6e5ecf38ff4459970b78d86a1d91539aaa5601

    SHA512

    9e5e675c748968c2bd72f6126d7d1b62d04bcbf96a127fc576ea58052c5fa8d08353beda9fb621f1a162fc069069a9f7ff34051eaa45fe675cc99688471f9f06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D

    Filesize

    528B

    MD5

    a85588facf5f1333a55b8beb5ddc8109

    SHA1

    ad86d20ccd709f88a71b335e29463c5ff20212d2

    SHA256

    e02092ec1e95ac717a788e3053941fc6fd456eb077d7f78f187655a8504e49a3

    SHA512

    7af063dc91f675575f747574be9d5442c9e58e39f19a8fbfcbbe38867aa70d321b66d9191973f97ddf953ec331137d896f14b4ed675be1d2a653ba08b9bc0557

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0

    Filesize

    552B

    MD5

    3f46a6aa1d9e3441d6f29ef67a643beb

    SHA1

    913e7ac62c5298976385dba46394b312dc0acb00

    SHA256

    46087a2128ab504280b7ca2d4181c44402e32bb0824c349808a17b3d8e77f30d

    SHA512

    51d848c8d95653eb40acff36845fd47de6860451e63980d670eebfef4c27ef58c744c13aaab813f11eccdf93be90945ba0c3075262d4e9270d0c6bc375d5e738

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    51ab5db47e78006038eed296aa01f8ec

    SHA1

    a18b6eafad9b25dd798d03263fe04c00ac57db9d

    SHA256

    e3d2cd081383f57cf792d4528799b8644729db1578078ca93368ae6d38e7799d

    SHA512

    5dc78e9ca402cdef6f881dc9eefbf05dbc484ff44dc656a44d9a48ec03c483889d51acdafadf99ddb173e79967e10b39e5b7b69b1169b57a5c20729a37f7b8f5

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\A7117DA5-F5D9-4BF7-9BEC-778CE08104A3\SodaPDFDesktop14.exe

    Filesize

    13.1MB

    MD5

    0fa077a0a32ed396bb5a053ed013a7b1

    SHA1

    35c9fe756e3f4c5411221d5887ae6332fc6fbdf7

    SHA256

    498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae

    SHA512

    9d567933f69ac0b9cc6ee9325a3f62785d99b209077dadc4e8ed4176e39dde0014ca4f87e40084110202ab1c7aaf88a5129e82b167d40a816c641cf9687f2791

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\752FCD8E-073C-4D97-8615-1FBE392B9DD6\SodaPDFDesktop14.exe

    Filesize

    11.4MB

    MD5

    7204b04eaf140a90cd7e7693875d0c82

    SHA1

    9612392c5fade2012f5e92adc9165aad1095958e

    SHA256

    c40d46017c7abfa591751955bc86a3a3b603f551e5e0b4744906710a4dabcee0

    SHA512

    941ac9f14dedcca6bf5432f493052fd1139987613fa01bda9071675553daeb4809cdb0cdbdda75a957c46f6ccac73afee6c4f1b4b14903ec6c3b831e5b431bdd