Behavioral task
behavioral1
Sample
768-2-0x0000000000850000-0x00000000012BF000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
768-2-0x0000000000850000-0x00000000012BF000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
768-2-0x0000000000850000-0x00000000012BF000-memory.dmp
-
Size
5.5MB
-
MD5
ddac86cfaba6111fa6aafb8556a49983
-
SHA1
a5c17933e1486401c5cbb71604617c9215b35f17
-
SHA256
3d1fd656421b3d2e22dce47db0c41a475bdb5e6e4f0a6e2f10fbea958dcb65ac
-
SHA512
5d587c9584f2e04a7337ae24d1afc26a5551bb18a8563bba9987a81e52ba39b0592dabd5d59846ef00ace018b9883fbe6453a6e009a0c3f5cb9880d7ae780b1e
-
SSDEEP
98304:iWZgO1cbxmPphvVgWLpLbfl3vnX1SsqQTtFeWZ94jKlnwyHFkjmFQyZurHICzQ:RZgmcbcDLB3vEsRLxZaKlnwyxQIurHO
Malware Config
Extracted
risepro
194.169.175.128
Signatures
-
Privateloader family
-
Risepro family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 768-2-0x0000000000850000-0x00000000012BF000-memory.dmp
Files
-
768-2-0x0000000000850000-0x00000000012BF000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Winzip0 Size: - Virtual size: 3.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Winzip1 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Winzip2 Size: 5.7MB - Virtual size: 5.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ