Analysis

  • max time kernel
    129s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-06-2024 04:37

General

  • Target

    2024-06-29_4fa265a317e6d90cdecce7ed6b805122_avoslocker_magniber_metamorfo.exe

  • Size

    13.1MB

  • MD5

    4fa265a317e6d90cdecce7ed6b805122

  • SHA1

    a6e12216cc8d9539085177fc437e0db6d340fa8e

  • SHA256

    8b3d51402f409cfae91aed05e3b8cd03392ea56b594b0b3f17b2aa6c3d281f7d

  • SHA512

    f46be468a7e8d4cb335788b6181ab0e9a933bd86c3cf6b4d3c87d78164f1b7667d1b9b7f687adb25fd925ab4900972293a494032560f1c038e9b609d2b499cae

  • SSDEEP

    196608:s16y1UicZXDmaEKCqtf6PaaLCtx+zFUlBbLrqNDaUQGX52RKh:srp0hUPaSfUBbLrqN2/GXdh

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 5 IoCs
  • Modifies registry class 46 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-29_4fa265a317e6d90cdecce7ed6b805122_avoslocker_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-29_4fa265a317e6d90cdecce7ed6b805122_avoslocker_magniber_metamorfo.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\F031B8CC-960C-4F56-B1A4-D522C84E668F\SodaPDFDesktop14.exe
      "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\F031B8CC-960C-4F56-B1A4-D522C84E668F\SodaPDFDesktop14.exe" /update=start /welcome
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:408
      • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\0C3EB4EE-C4BD-4679-97FF-81ACAD120A4C\SodaPDFDesktop14.exe
        "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\0C3EB4EE-C4BD-4679-97FF-81ACAD120A4C\SodaPDFDesktop14.exe" /update=finish /welcome
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4900
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:3848
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /welcome /no-check-updates
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:4940
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /CleanupTempFolder /ParentProcessId=4900
          4⤵
          • Executes dropped EXE
          PID:1480

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Soda PDF Desktop 14\Installation\updates-info.json
    Filesize

    2KB

    MD5

    2120b53a6e54f76d41a77135446a5b26

    SHA1

    c1734abda74ca48615a8dca3e3e9f4b755723d0d

    SHA256

    c0dca3cddc938ce75398f600f76b375e7fc2eb450f052654509181085049d17a

    SHA512

    8e38621818402ef88925a9852f282773c6c5ba268e03e8bd219131c06ca69764f79b8486326cd3c265cdaac04cbe4fe3c606ecc1f1f8f2132f02f38db155d214

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF
    Filesize

    812B

    MD5

    c930736f83fb0cd4c01787bb61d2a04b

    SHA1

    d27c3ff1a3aa66e33fec1ce6fa4f67f58946637c

    SHA256

    643eda261db1c399eb61f8b90246037604ab319118ee648d06be862be2677859

    SHA512

    12c640e68d15bf49924454fa147876d41500aabbbc4ab02f975b8f521c637ad2212c07263d9048f7d38bae3468865a485015f09921293a424aa9902208fa7abf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    1KB

    MD5

    c8597fb65a7a004cb22e09fa5a9409cc

    SHA1

    7c65ec586b2341626cace015b4d597f1eba2154f

    SHA256

    53f831bcd51fb96eacc19710541775915b8ee191d8b8a00c8284fcc4b85a57f6

    SHA512

    96741ba79e209d0276a7053b9a9a33712d84c51a77b38eac9b74ef94e541bb9c81508b86feaed37db2f4546f1fa81db62608a4ffb9cfb8e5b47f4a6879184b9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D
    Filesize

    1KB

    MD5

    3cbb0b5a5553a70286e68c248ccd3b9b

    SHA1

    a066d343b43f63ccd718b0ca9986706b77df0caf

    SHA256

    1318a5bb97b175f00368676a562b23fc6f8cdc2a44d97492b67f57ed59c7e3c9

    SHA512

    4aee8eaf081a9e9eddabfb43400ae4923e3cd5e1dc4c5063163482fb13544328d56af9b90af7d0ff2cb095cd203c3bbd21ed04728b52e0dbcc0ad28da2c2219e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0
    Filesize

    806B

    MD5

    35b826bb51512265a04f25bdc44de7c8

    SHA1

    90b84e7b88c72444d440155559b02b1f889a5249

    SHA256

    2395bca052608b56c3ea5a6755ed7f1526fc9a04bcbc591f23507872998ed81e

    SHA512

    fed4d3eae663abe64fd271490123962921108d6c45a4a32690931d60ffd8254a672b83f107f8df66a759c1501f5ed133a91825fc4e34efa0a44e913505146769

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF
    Filesize

    540B

    MD5

    c7f19ce91e040ee4f6ba939f761fef98

    SHA1

    e7c1ab5df085572c21270310732fc6d0989c8789

    SHA256

    e204c6b2e990f547b4c8caeeda3f0c1aea45fba2ee391269c9784d8e5610bede

    SHA512

    a7170d6ca94a5c3f00482fd0f45e5b238082718d4907e307b89b0ad616124dc5c4525420e85e94c89bccde90d91ed3dfd0dd463692181709ca2ee6f049f1a825

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    410B

    MD5

    f9a1f92cea0fdf60bea8dd9cbe658538

    SHA1

    0316e8ab931c3b29d58d5991c6a32bf90c0eb730

    SHA256

    4126c43652438c6e89f53b501d35f32bcd08cba3082d6eefdcb926129c122255

    SHA512

    2f0a8568c02828c3d90f50d8841ea009ae2a4b152444bd34422b46edce0797c770e72fe00b76ddf76621cff7ee90c2941241a093d3284b2e1590675f789f6e43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D
    Filesize

    528B

    MD5

    df7dbe4b56158e41b542c7fa0c1bdac2

    SHA1

    a77217c19695a08839ee54f7aa922607853af7e3

    SHA256

    001a7159b869158a3dde0872098ab95316a8565c3084e90088b0cc9f56c876cc

    SHA512

    460079c6e541f86fa2faa4096f401c4f608f3e74bd142fea48b8e2a01d8e67e0b615b5d9a371d0347290b4b791f4b816a3550b71db1b9c840bb5e8ce09d34198

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0
    Filesize

    552B

    MD5

    b2d0cc7be23e1b371d70a374d5035efe

    SHA1

    8b619e3985f0cea163fc6d25b40942049e625536

    SHA256

    9cf652fd817b225b5a992875335dfee203c9ebb94e315b19bcc11c0f19b5bb58

    SHA512

    9caba2d6a53c6acfc7821f363dde870d9dd4ff852bce6f7e2e69dd8c5a62d6b2e4a1240d21971f8416ae93797f93a90cbc34864d3927fac14e313d639206d2a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
    Filesize

    392B

    MD5

    848ff33dedd02301135938322a60eca7

    SHA1

    a993abc44217b80379d7114158c2ba9e52b949a5

    SHA256

    96c035762c3e4806f051ddc2a35e54a695d84f34efb67c3cce0832b451f338fe

    SHA512

    e8d7ea4a7796bfcc3df292f3f71ae42e6f3f9fd88cf60ef0ac4e9087585b140ee1560b3861445444557e535fbc406281dfa8e1062f1bc6b2948240e678920b6b

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\F031B8CC-960C-4F56-B1A4-D522C84E668F\SodaPDFDesktop14.exe
    Filesize

    13.1MB

    MD5

    4fa265a317e6d90cdecce7ed6b805122

    SHA1

    a6e12216cc8d9539085177fc437e0db6d340fa8e

    SHA256

    8b3d51402f409cfae91aed05e3b8cd03392ea56b594b0b3f17b2aa6c3d281f7d

    SHA512

    f46be468a7e8d4cb335788b6181ab0e9a933bd86c3cf6b4d3c87d78164f1b7667d1b9b7f687adb25fd925ab4900972293a494032560f1c038e9b609d2b499cae

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\0C3EB4EE-C4BD-4679-97FF-81ACAD120A4C\SodaPDFDesktop14.exe
    Filesize

    11.4MB

    MD5

    a679079f3e898b7e379d646b920a8ada

    SHA1

    c26120a44da618a1d2b0729afe852f40f923183c

    SHA256

    ed666aa56a68269ed1c25fd3838d80b283be11a841e0e7a094f01bb5803edaae

    SHA512

    4f707495c887d3cfe506a642c51a8fa9b6814e27f623b8061e7a4ec20bd3da898881db68a5e74a1b8d91159e9f9958fc123d06dea0916e7da7391794ed4954f0