Analysis
-
max time kernel
294s -
max time network
252s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 22:30
Behavioral task
behavioral1
Sample
0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe
Resource
win10-20240404-en
General
-
Target
0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe
-
Size
4.6MB
-
MD5
9f94ba372ce87a8ec90f0a43b6b9f7b6
-
SHA1
19777ba5b1006b5906fdccecc079a4d239bed187
-
SHA256
0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2
-
SHA512
b11cfad7da0254554524862fdc00baa85ebf7e774fc0eb5e94ca70838dda2339231daef65e7cbce56283ca30888e9dd2239a205da1f0b11672aeedd442b5ff44
-
SSDEEP
98304:MSyPy1mHB7Dt4i2bXcFTe24oFX/wJO4wHkUmRKlDfO15IZ0:MSCyUHVii2bXkT5Za5RKlDfO1qZ0
Malware Config
Extracted
risepro
194.110.13.70
147.45.47.169
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnk 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Loads dropped DLL 2 IoCs
pid Process 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
resource yara_rule behavioral1/memory/304-0-0x00000000010D0000-0x0000000001EC3000-memory.dmp themida behavioral1/memory/304-3-0x00000000010D0000-0x0000000001EC3000-memory.dmp themida behavioral1/memory/304-8-0x00000000010D0000-0x0000000001EC3000-memory.dmp themida behavioral1/memory/304-7-0x00000000010D0000-0x0000000001EC3000-memory.dmp themida behavioral1/memory/304-6-0x00000000010D0000-0x0000000001EC3000-memory.dmp themida behavioral1/memory/304-4-0x00000000010D0000-0x0000000001EC3000-memory.dmp themida behavioral1/files/0x0009000000016d19-15.dat themida behavioral1/memory/304-5-0x00000000010D0000-0x0000000001EC3000-memory.dmp themida behavioral1/files/0x00060000000173eb-26.dat themida behavioral1/memory/2968-34-0x0000000000960000-0x000000000144A000-memory.dmp themida behavioral1/memory/304-33-0x00000000010D0000-0x0000000001EC3000-memory.dmp themida behavioral1/memory/2968-36-0x0000000000960000-0x000000000144A000-memory.dmp themida behavioral1/memory/2968-35-0x0000000000960000-0x000000000144A000-memory.dmp themida behavioral1/memory/2968-39-0x0000000000960000-0x000000000144A000-memory.dmp themida behavioral1/memory/2968-40-0x0000000000960000-0x000000000144A000-memory.dmp themida behavioral1/memory/2968-38-0x0000000000960000-0x000000000144A000-memory.dmp themida behavioral1/memory/2968-37-0x0000000000960000-0x000000000144A000-memory.dmp themida behavioral1/memory/2968-46-0x0000000000960000-0x000000000144A000-memory.dmp themida behavioral1/memory/2968-58-0x0000000000960000-0x000000000144A000-memory.dmp themida behavioral1/memory/2968-70-0x0000000000960000-0x000000000144A000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\ExtreamFanV5 = "C:\\Users\\Admin\\AppData\\Local\\ExtreamFanV5\\ExtreamFanV5.exe" 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 2968 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2416 schtasks.exe 2420 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 2968 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 304 wrote to memory of 2416 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 30 PID 304 wrote to memory of 2416 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 30 PID 304 wrote to memory of 2416 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 30 PID 304 wrote to memory of 2416 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 30 PID 304 wrote to memory of 2420 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 32 PID 304 wrote to memory of 2420 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 32 PID 304 wrote to memory of 2420 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 32 PID 304 wrote to memory of 2420 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 32 PID 304 wrote to memory of 2968 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 35 PID 304 wrote to memory of 2968 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 35 PID 304 wrote to memory of 2968 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 35 PID 304 wrote to memory of 2968 304 0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe"C:\Users\Admin\AppData\Local\Temp\0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2416
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe"C:\Users\Admin\AppData\Local\Temp\0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD59f94ba372ce87a8ec90f0a43b6b9f7b6
SHA119777ba5b1006b5906fdccecc079a4d239bed187
SHA2560203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2
SHA512b11cfad7da0254554524862fdc00baa85ebf7e774fc0eb5e94ca70838dda2339231daef65e7cbce56283ca30888e9dd2239a205da1f0b11672aeedd442b5ff44
-
Filesize
1KB
MD502d47f2fdd0cf2c5316cdcb3d7ecc899
SHA1a4a43c6053a2630be7b3867b4f634413cfa693d2
SHA2566f5f527ba67ce4fe0025227786fafffb4e5ec468baaa141d3456e78b638fe059
SHA51297f0e9df2050a31d826d41f16b78b15797d81d1739c9a016d239c789e55301279753c462d0c4cc741aa389a609f5f25a604b02bdecf4a173705d774f35061eb2
-
\Users\Admin\AppData\Local\Temp\0203d873e829973442286495a39d5f214af944f8298784a2273e7181e3b281d2.exe
Filesize3.4MB
MD508babe47a702361d04e2ada7c02b00cd
SHA1f2b3d863dfd2046acda704948c5f1402abefe66c
SHA256fdf378efa5749387f813c8a3de2d1e964a9eda5a509cf5c4996980d7af5badef
SHA512f5af9a0fdd9c44c8d18435348942d0138fb34875d1038f15623fbdbebe95d5f87485d8c31abbcacf939f198091adcf70b180a3388154afebec67bd5e1b50ff5f