Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
17/11/2023, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe
Resource
win10-20231020-en
5 signatures
150 seconds
General
-
Target
e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe
-
Size
3.2MB
-
MD5
b354c0fe17a926137e2c1d54f3b5c489
-
SHA1
a6bb0943d57980ea6e7b7fd0f685138819ed80a0
-
SHA256
e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf
-
SHA512
b198d737b4134ad789866002e4dea97d75dc9c9586d72097d5755f8c6eae8401501d7b338df3173dcd9f006e580dbe546211559cd5722c9ee140648d6b50dad3
-
SSDEEP
49152:sMbwMc13tn/rx+h6a3vHNh9nspVlp1WHazasbPsJaYNuiZ1:3ux+o8nKb7WHazasbPTYr
Score
10/10
Malware Config
Extracted
Family
risepro
C2
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4324 set thread context of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4324 wrote to memory of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71 PID 4324 wrote to memory of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71 PID 4324 wrote to memory of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71 PID 4324 wrote to memory of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71 PID 4324 wrote to memory of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71 PID 4324 wrote to memory of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71 PID 4324 wrote to memory of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71 PID 4324 wrote to memory of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71 PID 4324 wrote to memory of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71 PID 4324 wrote to memory of 5020 4324 e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe"C:\Users\Admin\AppData\Local\Temp\e920581589e8d9dfee92d78c904611c3aa398dde74464759d6968acaa5acaacf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5020
-