Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 14:38

General

  • Target

    202407040fa077a0a32ed396bb5a053ed013a7b1avoslockermagnibermetamorfo.exe

  • Size

    13.1MB

  • MD5

    0fa077a0a32ed396bb5a053ed013a7b1

  • SHA1

    35c9fe756e3f4c5411221d5887ae6332fc6fbdf7

  • SHA256

    498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae

  • SHA512

    9d567933f69ac0b9cc6ee9325a3f62785d99b209077dadc4e8ed4176e39dde0014ca4f87e40084110202ab1c7aaf88a5129e82b167d40a816c641cf9687f2791

  • SSDEEP

    196608:G16y1UicZXDmaEKCqtf6PaaLCtx+zFUlBbLrqN3aUQGXM2RKR:Grp0hUPaSfUBbLrqNq/GX8R

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\202407040fa077a0a32ed396bb5a053ed013a7b1avoslockermagnibermetamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\202407040fa077a0a32ed396bb5a053ed013a7b1avoslockermagnibermetamorfo.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\13ED592F-4D28-4562-B448-565608852E84\SodaPDFDesktop14.exe
      "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\13ED592F-4D28-4562-B448-565608852E84\SodaPDFDesktop14.exe" /update=start /welcome
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    86bb172ab3c986a54a0373153e43197f

    SHA1

    beea12ea71bf37ac043450e9f9c2139cbffc33a1

    SHA256

    1876762e64b1211645b45cee74440f9218c80035a554b3876898e8676f414d57

    SHA512

    5a1071e1b12ea7e5833c7dbdde94d38b395495aef099684f1ce7948bedff7a04afaf55868542bd58db8084e2e0158cea18e456c384b3b6152f1004d4cc96219b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    9abf34cf4ba0967f8ab1990535969b6d

    SHA1

    d1c6cb31299bba3f0a0b4ade4e3dcb9646570723

    SHA256

    8a7f22a7850246d56d0f4c96925a249a5a5f627a000ff41879e41a7cbdc786f3

    SHA512

    ef9c1b44ebdb0a7cfbe41e71c9a2286d9c0254894c71107f0c8c06b0e94f78834c3cb3cc9ca400cdfd8444399b69084180a1369754f64057979ef338dd53f185

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59ecfc485ac1ac6d1da783db80dce693

    SHA1

    ee42e55eceb9c8612eeb510385c996dada4b8919

    SHA256

    b7a9926fd5b275f61d37a5a054830628a512c2873b13270dba6f299bce0cc996

    SHA512

    827ac6448e41781925d9dd141d22b05074e29d87bb29b08013adcdabda6154794e4a0b6d906812cd3df8680887ce6da14c06266af59f074ccf4121e66dca5995

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    5568f17faaa542abb7a42f3733fc1f93

    SHA1

    5f6b0da037cb903aa8f2c6398af4bb7aebd5cb87

    SHA256

    48b5e4b11396e494940178d05684f6105ac9f4a6635b8d2c89c0704869433421

    SHA512

    607a02f1ae85987f6501fa4fd73b836e84a94805141aa366be208233d31587b74ed2628a961d083d9900db2d4e182c5f10f878e982ba6de48f665e178e491eaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    0433f75ad2a7bf8074accd3c299d7400

    SHA1

    a717504065b173a4315cf5d7f2ed3bdc238576ec

    SHA256

    92ec207832a116ba0056d85301585708c740f723b45bfee83a2f644e2ef2ebe3

    SHA512

    207a341bb445353b977e67c436c310a56a77c6101b4488aec210157afc12464da9f0216227506dd7e3bc09eb22e62148601a81c199836d2b7a8660bf0c950570

  • C:\Users\Admin\AppData\Local\Temp\Tar2157.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\13ED592F-4D28-4562-B448-565608852E84\SodaPDFDesktop14.exe

    Filesize

    13.1MB

    MD5

    0fa077a0a32ed396bb5a053ed013a7b1

    SHA1

    35c9fe756e3f4c5411221d5887ae6332fc6fbdf7

    SHA256

    498bc2aae60cb6ad3247f39d6c66406b42ffd16adc05301476481460fc41a1ae

    SHA512

    9d567933f69ac0b9cc6ee9325a3f62785d99b209077dadc4e8ed4176e39dde0014ca4f87e40084110202ab1c7aaf88a5129e82b167d40a816c641cf9687f2791