Analysis

  • max time kernel
    93s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-06-2024 04:39

General

  • Target

    2024-06-29_55d7ad8bdf0b2385d40989170faff910_avoslocker_magniber_metamorfo.exe

  • Size

    13.1MB

  • MD5

    55d7ad8bdf0b2385d40989170faff910

  • SHA1

    5a51a423b033df7e1418390c6043bc071f51574e

  • SHA256

    0b657ff22ee10739df91eb942c8675f39e825f6e1f540f2e57721b9a98971a6e

  • SHA512

    e579f35c450608cb66c0c51c920c42fe618ded2e7862ac36a5df2a6f830ca939d84b112912417f9aa72f456a5b1ff4f5b19cb1d8b2f4bc046f6daeef104cc335

  • SSDEEP

    196608:s16y1UicZXDmaEKCqtf6PaaLCtx+zFUlBbLrqNUaUQGXp2RKw:srp0hUPaSfUBbLrqNN/GXNw

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Executes dropped EXE 5 IoCs
  • Modifies registry class 46 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-29_55d7ad8bdf0b2385d40989170faff910_avoslocker_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-29_55d7ad8bdf0b2385d40989170faff910_avoslocker_magniber_metamorfo.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\CEAE5910-309F-45C0-9227-F8D18B9F69B2\SodaPDFDesktop14.exe
      "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\CEAE5910-309F-45C0-9227-F8D18B9F69B2\SodaPDFDesktop14.exe" /update=start /welcome
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\7CAA877D-F164-4810-A0EF-19672D1617F8\SodaPDFDesktop14.exe
        "C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\7CAA877D-F164-4810-A0EF-19672D1617F8\SodaPDFDesktop14.exe" /update=finish /welcome
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1144
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:2664
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /welcome /no-check-updates
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:1528
        • C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe
          "C:\ProgramData\Soda PDF Desktop 14\Installation\SodaPDFDesktop14.exe" /CleanupTempFolder /ParentProcessId=1144
          4⤵
          • Executes dropped EXE
          PID:1372

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Soda PDF Desktop 14\Installation\updates-info.json
    Filesize

    2KB

    MD5

    88b53b18cdea98801a14668698f333fe

    SHA1

    071cbb91febfb10480118ee0fd6754623799220c

    SHA256

    edc55f0e850f379a2f66a890b75a6cb26cf6ffbad202f8411889594e44eb00fa

    SHA512

    839bf3f3e07d0c7f4777e0d1dcd184241bf30c17343080326d2bcb28a28a0b7e1be7fa0da248f5591f230f5c35ee7367fb294c5804641d5eb4fbb01549951f54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF
    Filesize

    812B

    MD5

    c930736f83fb0cd4c01787bb61d2a04b

    SHA1

    d27c3ff1a3aa66e33fec1ce6fa4f67f58946637c

    SHA256

    643eda261db1c399eb61f8b90246037604ab319118ee648d06be862be2677859

    SHA512

    12c640e68d15bf49924454fa147876d41500aabbbc4ab02f975b8f521c637ad2212c07263d9048f7d38bae3468865a485015f09921293a424aa9902208fa7abf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    1KB

    MD5

    c8597fb65a7a004cb22e09fa5a9409cc

    SHA1

    7c65ec586b2341626cace015b4d597f1eba2154f

    SHA256

    53f831bcd51fb96eacc19710541775915b8ee191d8b8a00c8284fcc4b85a57f6

    SHA512

    96741ba79e209d0276a7053b9a9a33712d84c51a77b38eac9b74ef94e541bb9c81508b86feaed37db2f4546f1fa81db62608a4ffb9cfb8e5b47f4a6879184b9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D
    Filesize

    1KB

    MD5

    3cbb0b5a5553a70286e68c248ccd3b9b

    SHA1

    a066d343b43f63ccd718b0ca9986706b77df0caf

    SHA256

    1318a5bb97b175f00368676a562b23fc6f8cdc2a44d97492b67f57ed59c7e3c9

    SHA512

    4aee8eaf081a9e9eddabfb43400ae4923e3cd5e1dc4c5063163482fb13544328d56af9b90af7d0ff2cb095cd203c3bbd21ed04728b52e0dbcc0ad28da2c2219e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0
    Filesize

    806B

    MD5

    35b826bb51512265a04f25bdc44de7c8

    SHA1

    90b84e7b88c72444d440155559b02b1f889a5249

    SHA256

    2395bca052608b56c3ea5a6755ed7f1526fc9a04bcbc591f23507872998ed81e

    SHA512

    fed4d3eae663abe64fd271490123962921108d6c45a4a32690931d60ffd8254a672b83f107f8df66a759c1501f5ed133a91825fc4e34efa0a44e913505146769

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\026A86A161D256DBB33076EDF20C0E5E_86AB612B21DEDF3B8CD155ED2E4114FF
    Filesize

    540B

    MD5

    62ea5395c5c609ae867775693d9fad37

    SHA1

    ae6f0a121cc4fb409e9959cea407dbc5ecc0791e

    SHA256

    f509254f48c2acba1e64fef0e7e7b5d3ff4da8ba09e2523c908a709ce0ce089a

    SHA512

    2891c46d2620e36daa9b98518e34f181f22b86350fe9a8269c583b432bdabb037e5ad6160ec8f8d0a8619a0c5311654dfa4fb4b9f65956b90307094c00651ee8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    410B

    MD5

    cd511b5050fd33ffe4272a9957187541

    SHA1

    40aa7539af35da8ea5a4731383e74bba37f4a7be

    SHA256

    bcce15f83aef8a213dadc3434806ff657182464bcb0fee6354a6bc4e2b48467c

    SHA512

    e86a96ce8e0aecd5ab5674ebee96266b07754b454ee634c8c013092ad4e17067676f4cef166b3fbaafaa3bd406d1f9cc6ef9027753f4512141a40797a7d69d9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_EBDB5A7037F08CDFB408DBFC0D44B43D
    Filesize

    528B

    MD5

    1e372080fd0d5c1edf9a3e8135a9c78f

    SHA1

    c39b3bd2e377011d80fa1f0cc045fa6b0bb55c98

    SHA256

    8cdc633e603033a17d1150b6c2fc042432f6798f3a32d15360093e5f5e3dc355

    SHA512

    e5ee8d8535c61f484bc30ce958fd7d326e3ee8878a3515a1450cf53f8c3ebea7b1ba82214c9f2bcfdf38a210731e257f703d50051848150cdb4b13a2eb82bbea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AF360AACB1570042DEFBC833317997D0_FB2F322741B359ABDC63489C2FBB09D0
    Filesize

    552B

    MD5

    8d4433a0cd110b1f8635a153f835c2a0

    SHA1

    d64e7fa2ed44750e1da924373d0dd2d60cca1397

    SHA256

    447ea757485c376215bcb0dc84ae249e4e5b621b41399a38109e9e1f1c6ecb3f

    SHA512

    04848ba98fc2bcababed348581e9b8e9a118d8e9e25a4a4ed7f459971e15b3e6d04035a839f9d630ad9fe6103ef68236f0f276f83d0b35ff4ab6d6d4c7fa1346

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
    Filesize

    392B

    MD5

    63a50886c1985c29608942f1eaa43320

    SHA1

    66174b87ce46af5ac9befa54d1142890ffb28bf0

    SHA256

    5172ead29c23e63cb2e99356508818e535295701aa02fe4d6d7842bfcd3f09d4

    SHA512

    85d17b0d5d1f2768d285148a31bdc7bfcab52a45699ef1fbed96fd0735d42ba81b868fa7fe78caf4789debf3d158e4309136ed02b7eefc206673dd60d0323cd2

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.356.3146\CEAE5910-309F-45C0-9227-F8D18B9F69B2\SodaPDFDesktop14.exe
    Filesize

    13.1MB

    MD5

    55d7ad8bdf0b2385d40989170faff910

    SHA1

    5a51a423b033df7e1418390c6043bc071f51574e

    SHA256

    0b657ff22ee10739df91eb942c8675f39e825f6e1f540f2e57721b9a98971a6e

    SHA512

    e579f35c450608cb66c0c51c920c42fe618ded2e7862ac36a5df2a6f830ca939d84b112912417f9aa72f456a5b1ff4f5b19cb1d8b2f4bc046f6daeef104cc335

  • C:\Users\Admin\AppData\Local\Temp\SodaPDFDesktop14\14.0.400.3196\7CAA877D-F164-4810-A0EF-19672D1617F8\SodaPDFDesktop14.exe
    Filesize

    11.4MB

    MD5

    26b2e5213dd3d8545c5339d1b1a1cd74

    SHA1

    027c003376483d6be28be5e60fadac002627feaa

    SHA256

    156f6a8e5488588807fdb0695a9725406bfd2cb967a3620d87399992c9eccd02

    SHA512

    f00867e826db8e3a6433f770f6b69513caefad6561bbe5d0ceb83b4a3290558f6b7bcadcba927ef76283a474037f36edda19f6e84784e11da3afb4e7c5eaa3c6