Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 20:18

General

  • Target

    RisePro_Server.exe

  • Size

    57.5MB

  • MD5

    1e09287be79ea9e8970b009c60ec71e4

  • SHA1

    fa44121e58fd7115842269053c0434d90a0dda2d

  • SHA256

    3f1065fe34fb5335fcf26d96565d669af0eb18a8ff0b1dc5ab2f4cd172e27272

  • SHA512

    902f0ba30ff8a3c72b32c8693c56dfa0aaa9955b42f65a1181873c710383fd76ca922752ffbcb81be4eebf6926f80f0a8f8dfdb467e77fbe935843f009f00174

  • SSDEEP

    1572864:LcMpLABVCAtQbu4P5im/GpXyNqDK2vERS:LrpLaVFtQS4P6pZa

Malware Config

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RisePro_Server.exe
    "C:\Users\Admin\AppData\Local\Temp\RisePro_Server.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2832
    • C:\Users\Admin\AppData\Local\Temp\tmp\GoogleRestore.exe
      .\tmp\GoogleRestore.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\GoogleRestore.exe
        .\tmp\GoogleRestore.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2900
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c netsh advfirewall firewall show rule name="RisePro External - 50500" > nul
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Windows\SysWOW64\netsh.exe
        netsh advfirewall firewall show rule name="RisePro External - 50500"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2476
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c netsh advfirewall firewall show rule name="RisePro External - 1080" > nul
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\SysWOW64\netsh.exe
        netsh advfirewall firewall show rule name="RisePro External - 1080"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:484
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="RisePro External - 1080" dir=in action=allow protocol=TCP localport=1080
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\SysWOW64\netsh.exe
        netsh advfirewall firewall add rule name="RisePro External - 1080" dir=in action=allow protocol=TCP localport=1080
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:1640
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="RisePro External - 50500" dir=in action=allow protocol=TCP localport=50500
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Windows\SysWOW64\netsh.exe
        netsh advfirewall firewall add rule name="RisePro External - 50500" dir=in action=allow protocol=TCP localport=50500
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\GoogleRestore.exe

    Filesize

    42.0MB

    MD5

    e87468059f0dbf9db59dc5e4383a00f5

    SHA1

    4ef6b9ee98070a0893f68d824f5b125bd0c97b53

    SHA256

    f66a3a553aad6ae0f90179837a98f55a5a9fb0f21c102d0a054deb1de747b392

    SHA512

    d5f0a359e975e1a7dbea1b742a5e6f599bf83ba7d97775be97f55629ca48b67e091f1f79a9e3dcce4f1dbfa2ff7ea37e81ce8939cceb72b0160b67957f9d7de7

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\python311.dll

    Filesize

    5.5MB

    MD5

    1fe47c83669491bf38a949253d7d960f

    SHA1

    de5cc181c0e26cbcb31309fe00d9f2f5264d2b25

    SHA256

    0a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae

    SHA512

    05cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Africa\Banjul

    Filesize

    130B

    MD5

    796a57137d718e4fa3db8ef611f18e61

    SHA1

    23f0868c618aee82234605f5a0002356042e9349

    SHA256

    f3e7fcaa0e9840ff4169d3567d8fb5926644848f4963d7acf92320843c5d486e

    SHA512

    64a8de7d9e2e612a6e9438f2de598b11fecc5252052d92278c96dd6019abe7465e11c995e009dfbc76362080217e9df9091114bdbd1431828842348390cb997b

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Africa\Djibouti

    Filesize

    191B

    MD5

    fe54394a3dcf951bad3c293980109dd2

    SHA1

    4650b524081009959e8487ed97c07a331c13fd2d

    SHA256

    0783854f52c33ada6b6d2a5d867662f0ae8e15238d2fce7b9ada4f4d319eb466

    SHA512

    fe4cf1dd66ae0739f1051be91d729efebde5459967bbe41adbdd3330d84d167a7f8db6d4974225cb75e3b2d207480dfb3862f2b1dda717f33b9c11d33dcac418

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Africa\Kigali

    Filesize

    131B

    MD5

    a87061b72790e27d9f155644521d8cce

    SHA1

    78de9718a513568db02a07447958b30ed9bae879

    SHA256

    fd4a97368230a89676c987779510a9920fe8d911fa065481536d1048cd0f529e

    SHA512

    3f071fd343d4e0f5678859c4f7f48c292f8b9a3d62d1075938c160142defd4f0423d8f031c95c48119ac71f160c9b6a02975841d49422b61b542418b8a63e441

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Africa\Lagos

    Filesize

    180B

    MD5

    89de77d185e9a76612bd5f9fb043a9c2

    SHA1

    0c58600cb28c94c8642dedb01ac1c3ce84ee9acf

    SHA256

    e5ef1288571cc56c5276ca966e1c8a675c6747726d758ecafe7effce6eca7be4

    SHA512

    e2fb974fa770639d56edc5f267306be7ee9b00b9b214a06739c0dad0403903d8432e1c7b9d4322a8c9c31bd1faa8083e262f9d851c29562883ca3933e01d018c

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\America\Curacao

    Filesize

    177B

    MD5

    92d3b867243120ea811c24c038e5b053

    SHA1

    ade39dfb24b20a67d3ac8cc7f59d364904934174

    SHA256

    abbe8628dd5487c889db816ce3a5077bbb47f6bafafeb9411d92d6ef2f70ce8d

    SHA512

    1eee8298dffa70049439884f269f90c0babcc8e94c5ccb595f12c8cfe3ad12d52b2d82a5853d0ff4a0e4d6069458cc1517b7535278b2fdef145e024e3531daad

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\America\Toronto

    Filesize

    1KB

    MD5

    628174eba2d7050564c54d1370a19ca8

    SHA1

    e350a7a426e09233cc0af406f5729d0ab888624f

    SHA256

    ad2d427ab03715175039471b61aa611d4fdf33cfb61f2b15993ec17c401ba1e5

    SHA512

    e12bf4b9a296b4b2e8288b3f1e8f0f3aeaee52781a21f249708e6b785a48100feab10ac8ba10ac8067e4b84312d3d94ed5878a9bda06c63efe96322f05ebbc6f

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Asia\Shanghai

    Filesize

    393B

    MD5

    dff9cd919f10d25842d1381cdff9f7f7

    SHA1

    2aa2d896e8dde7bc74cb502cd8bff5a2a19b511f

    SHA256

    bf8b7ed82fe6e63e6d98f8cea934eeac901cd16aba85eb5755ce3f8b4289ea8a

    SHA512

    c6f4ef7e4961d9f5ae353a5a54d5263fea784255884f7c18728e05806d7c80247a2af5d9999d805f40b0cc86a580a3e2e81135fdd49d62876a15e1ab50e148b7

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Etc\UCT

    Filesize

    111B

    MD5

    51d8a0e68892ebf0854a1b4250ffb26b

    SHA1

    b3ea2db080cd92273d70a8795d1f6378ac1d2b74

    SHA256

    fddce1e648a1732ac29afd9a16151b2973cdf082e7ec0c690f7e42be6b598b93

    SHA512

    4d0def0cd33012754835b27078d64141503c8762e7fb0f74ac669b8e2768deeba14900feef6174f65b1c3dd2ea0ce9a73bba499275c1c75bcae91cd266262b78

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Europe\Isle_of_Man

    Filesize

    1KB

    MD5

    b14ab0a98fb1964def4eaf00d2a6bb73

    SHA1

    842e6ede8817936de650a0c1266569f26994790a

    SHA256

    bb29fb3bc9e07af2a8004ccdd996c4a92b6b64694f84d558e20fc29473445c57

    SHA512

    301ba2529dfe935c96665160bf3f873aaa393de3c85b32a0ba29610d35a52b199db6aff36a2aa4b1a0125617bd9bf746838312e87097a320dad9752c70302d26

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Europe\Oslo

    Filesize

    705B

    MD5

    2577d6d2ba90616ca47c8ee8d9fbca20

    SHA1

    e8f7079796d21c70589f90d7682f730ed236afd4

    SHA256

    a7fd9932d785d4d690900b834c3563c1810c1cf2e01711bcc0926af6c0767cb7

    SHA512

    f228ca1ef2756f955566513d7480d779b10b74a8780f2c3f1768730a1a9ae54c5ac44890d0690b59df70c4194a414f276f59bb29389f6fa29719cb06cb946ceb

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Europe\Skopje

    Filesize

    478B

    MD5

    a4ac1780d547f4e4c41cab4c6cf1d76d

    SHA1

    9033138c20102912b7078149abc940ea83268587

    SHA256

    a8c964f3eaa7a209d9a650fb16c68c003e9a5fc62ffbbb10fa849d54fb3662d6

    SHA512

    7fd5c4598f9d61a3888b4831b0c256ac8c07a5ae28123f969549ae3085a77fece562a09805c44eab7973765d850f6c58f9fcf42582bdd7fd0cdba6cd3d432469

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Greenwich

    Filesize

    111B

    MD5

    e7577ad74319a942781e7153a97d7690

    SHA1

    91d9c2bf1cbb44214a808e923469d2153b3f9a3f

    SHA256

    dc4a07571b10884e4f4f3450c9d1a1cbf4c03ef53d06ed2e4ea152d9eba5d5d7

    SHA512

    b4bc0ddba238fcab00c99987ea7bd5d5fa15967eceba6a2455ecd1d81679b4c76182b5a9e10c004b55dc98abc68ce0912d4f42547b24a22b0f5f0f90117e2b55

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Pacific\Wallis

    Filesize

    134B

    MD5

    ba8d62a6ed66f462087e00ad76f7354d

    SHA1

    584a5063b3f9c2c1159cebea8ea2813e105f3173

    SHA256

    09035620bd831697a3e9072f82de34cfca5e912d50c8da547739aa2f28fb6d8e

    SHA512

    9c5dba4f7c71d5c753895cbfdb01e18b9195f7aad971948eb8e8817b7aca9b7531ca250cdce0e01a5b97ba42c1c9049fd93a2f1ed886ef9779a54babd969f761

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133725467713492000\tzdata\zoneinfo\Pacific\Yap

    Filesize

    154B

    MD5

    bcf8aa818432d7ae244087c7306bcb23

    SHA1

    5a91d56826d9fc9bc84c408c581a12127690ed11

    SHA256

    683001055b6ef9dc9d88734e0eddd1782f1c3643b7c13a75e9cf8e9052006e19

    SHA512

    d5721c5bf8e1df68fbe2c83bb5cd1edea331f8be7f2a7ef7a6c45f1c656857f2f981adb2c82d8b380c88b1ddea6abb20d692c45403f9562448908637d70fa221

  • C:\Users\Admin\AppData\Local\Temp\tmp\GoogleRestore.exe

    Filesize

    35.8MB

    MD5

    a97a8ac0ac6e7b59dff255d775413ea9

    SHA1

    0670919b459f1a6eeb23c3d2ca814ab95a21f557

    SHA256

    c57a717fb7b84ebf85611d9229379cd6e5a861dfbfe3356ec748a57ee3d87aa5

    SHA512

    7f2a77d67475e1f1bbdb02c6866a97d6b4b5f5dabfe6fb3af90ed950a9847b43fc17e7685761b428cb143c74e126e326cfd61a968cf86d084756f577342c99de

  • \Users\Admin\AppData\Local\Temp\tmp\mozglue.dll

    Filesize

    133KB

    MD5

    8f73c08a9660691143661bf7332c3c27

    SHA1

    37fa65dd737c50fda710fdbde89e51374d0c204a

    SHA256

    3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

    SHA512

    0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

  • \Users\Admin\AppData\Local\Temp\tmp\msvcp140.dll

    Filesize

    451KB

    MD5

    f027303816d6d2afeab12183c67b1348

    SHA1

    735e1625b17e4122608eb3aff3702b97e08f1e51

    SHA256

    75ddc9778c23ee95b6c57db6b689f11c07d164d5a4c158d4c0acb87a520b8004

    SHA512

    f55f6df42f266cc5f5f23690a5942068248d50d1c302708bf34d1f9d8831c7bfa174489de029dada30707df4544275b14fbb3dda09a0a022eb343e2618401797

  • \Users\Admin\AppData\Local\Temp\tmp\nss3.dll

    Filesize

    1.2MB

    MD5

    bfac4e3c5908856ba17d41edcd455a51

    SHA1

    8eec7e888767aa9e4cca8ff246eb2aacb9170428

    SHA256

    e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

    SHA512

    2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

  • \Users\Admin\AppData\Local\Temp\tmp\vcruntime140.dll

    Filesize

    85KB

    MD5

    ac139e08070885a2f021e30fab609eee

    SHA1

    3d3c2877cf3c4aa1a1f62708494375404d02cf22

    SHA256

    eea2df0c3d2bf84ee8bc811439a81578f6521c8b28b6cc815c93fb870ac7a0d7

    SHA512

    072dc8a2297eea0778f72f70ab5c8dc0400cecbe399115a4cee0cb7381d494565019d756f602d80077c22ab635b324ec10c644bf3c219a68d9c75840a8b5309f

  • memory/2424-14-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/2424-39-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2424-52-0x0000000000400000-0x0000000001400000-memory.dmp

    Filesize

    16.0MB

  • memory/2424-43-0x0000000000400000-0x0000000001400000-memory.dmp

    Filesize

    16.0MB

  • memory/2424-42-0x0000000000401000-0x0000000000982000-memory.dmp

    Filesize

    5.5MB

  • memory/2424-0-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2424-2-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2424-4-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2424-5-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2424-7-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2424-9-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2424-10-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/2424-12-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/2424-48-0x0000000000400000-0x0000000001400000-memory.dmp

    Filesize

    16.0MB

  • memory/2424-15-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2424-17-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2424-19-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2424-22-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2424-24-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2424-27-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/2424-29-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/2424-32-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2424-34-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2424-37-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2424-1339-0x0000000000400000-0x0000000001400000-memory.dmp

    Filesize

    16.0MB