Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    29-06-2024 04:29

General

  • Target

    2024-06-29_11738149313efb1d9720e7f046e025da_avoslocker_magniber_metamorfo.exe

  • Size

    13.1MB

  • MD5

    11738149313efb1d9720e7f046e025da

  • SHA1

    1d9fe5772521ee3d826c15a17035dbdf3db71329

  • SHA256

    c597859df685d6582619d086801386ec6293ca635c837bc3c1575c3b2cbeb027

  • SHA512

    da6914cb1e29fd7101375080416026104d868026528dd2f06f48b569d608b22e87f7d3b8d29f1a68fa5b47aaf4a766ab86964e2971b646ec3985ce1ce692c16c

  • SSDEEP

    196608:d16y1UicZXDmaEKCqtf6PaaLCtx+zFUlBbLrqNeaUQGX12RKp:drp0hUPaSfUBbLrqNT/GXBp

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-29_11738149313efb1d9720e7f046e025da_avoslocker_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-29_11738149313efb1d9720e7f046e025da_avoslocker_magniber_metamorfo.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\4E39E27F-BAD4-483C-BFE8-D53C3D9EA59C\SodaPDFDesktop14.exe
      "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\4E39E27F-BAD4-483C-BFE8-D53C3D9EA59C\SodaPDFDesktop14.exe" /update=start /welcome
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2636

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    1KB

    MD5

    c8597fb65a7a004cb22e09fa5a9409cc

    SHA1

    7c65ec586b2341626cace015b4d597f1eba2154f

    SHA256

    53f831bcd51fb96eacc19710541775915b8ee191d8b8a00c8284fcc4b85a57f6

    SHA512

    96741ba79e209d0276a7053b9a9a33712d84c51a77b38eac9b74ef94e541bb9c81508b86feaed37db2f4546f1fa81db62608a4ffb9cfb8e5b47f4a6879184b9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    410B

    MD5

    1345aee67ccf492ad259d47c37a39360

    SHA1

    4a137bc5dc41da09a18ece1d6f6a01564583900a

    SHA256

    af6bb5b845bf661b7853345c6c847a216f53c644a52ed8f26d7dd6c944c2a4f5

    SHA512

    e669d58768450d0321b9e2569bab663b45afa8859c4d5b71de4bfe09fc8b206656ecd5577520c8b10172ac55fd09b119799fba84430f5281a3470ad208c2e1e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    99c9a24a22f1e08ca427f11ec3705579

    SHA1

    25491318a7addfcaf12ce0cd2e3d121a38b140e5

    SHA256

    fb0f78fdd9ebebcfef89b1df8d85b496d7d963b17cfe7bca136faeabae82bb5b

    SHA512

    3d26666431a9305d791428e7cec1c3823a3e42fc6c72638036334c98f160556eadf7d92aa20f667dfcd37d76b05d91b75ed1fdf2acd5e44f24806889e5dc45df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
    Filesize

    392B

    MD5

    7d8a378a56a4d786eeaaeadf5aca0a79

    SHA1

    6594aeb9e2a096627e46791b763d571fd34cf264

    SHA256

    4318a59f3d69ab3c974d6230706f0dcb57fd845fd32d50af6c23c28998efaa54

    SHA512

    c1bb4fc0b9311abf6918327c09a2a26056facaa536e3701747af6a644efeb705368c2edb0cc14ac03aa7d84dc07fae0bd440df545a7f727adc94f585e082e3f6

  • C:\Users\Admin\AppData\Local\Temp\Cab2E80.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar32C7.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\Tar336F.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\4E39E27F-BAD4-483C-BFE8-D53C3D9EA59C\SodaPDFDesktop14.exe
    Filesize

    13.1MB

    MD5

    11738149313efb1d9720e7f046e025da

    SHA1

    1d9fe5772521ee3d826c15a17035dbdf3db71329

    SHA256

    c597859df685d6582619d086801386ec6293ca635c837bc3c1575c3b2cbeb027

    SHA512

    da6914cb1e29fd7101375080416026104d868026528dd2f06f48b569d608b22e87f7d3b8d29f1a68fa5b47aaf4a766ab86964e2971b646ec3985ce1ce692c16c