Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe
Resource
win10v2004-20240802-en
General
-
Target
dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe
-
Size
2.6MB
-
MD5
925093e2950c0a665edfc0c18c142998
-
SHA1
67e43dc4af96a1bee60bbcff0b82cba128ad9013
-
SHA256
dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4
-
SHA512
68d552dad511589e0b7cc373a9b1686753216fbb39e17064abd851ae6803577b656bc42b273277a3d249326d58cd374f066191ac87871902b9082e078a9005ff
-
SSDEEP
49152:Iqv20d3g5cbpU6+nEhAzGphfROJPx9HznBKroCyQ1q0rwI:JgyGT65RsPx9jwt
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk AppLaunch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" AppLaunch.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy AppLaunch.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini AppLaunch.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol AppLaunch.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1180 schtasks.exe 2632 schtasks.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1760 wrote to memory of 4428 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 90 PID 1760 wrote to memory of 4428 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 90 PID 1760 wrote to memory of 4428 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 90 PID 1760 wrote to memory of 2020 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 91 PID 1760 wrote to memory of 2020 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 91 PID 1760 wrote to memory of 2020 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 91 PID 1760 wrote to memory of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 PID 1760 wrote to memory of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 PID 1760 wrote to memory of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 PID 1760 wrote to memory of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 PID 1760 wrote to memory of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 PID 1760 wrote to memory of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 PID 1760 wrote to memory of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 PID 1760 wrote to memory of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 PID 1760 wrote to memory of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 PID 1760 wrote to memory of 1464 1760 dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe 92 PID 1464 wrote to memory of 1180 1464 AppLaunch.exe 94 PID 1464 wrote to memory of 1180 1464 AppLaunch.exe 94 PID 1464 wrote to memory of 1180 1464 AppLaunch.exe 94 PID 1464 wrote to memory of 2632 1464 AppLaunch.exe 96 PID 1464 wrote to memory of 2632 1464 AppLaunch.exe 96 PID 1464 wrote to memory of 2632 1464 AppLaunch.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe"C:\Users\Admin\AppData\Local\Temp\dc2837b22ed6faa42008aefc4220b3b7766077c8bcf20816950b70d18eee8ec4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1180
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2632
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4004,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:81⤵PID:748
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc