Behavioral task
behavioral1
Sample
2092-0-0x00000000008C0000-0x0000000000E2E000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2092-0-0x00000000008C0000-0x0000000000E2E000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
2092-0-0x00000000008C0000-0x0000000000E2E000-memory.dmp
-
Size
5.4MB
-
MD5
6f6fcc46c230dc625e736c04513bd9b7
-
SHA1
d8ac56e2ce1a78acbc71e618bdd7f0cbe746cb54
-
SHA256
4927e60b88e4ec2b50e8078d020311d9d8876a20074310d36ed5d8f1d6f8691e
-
SHA512
0bb95b8c9709922147c7bf884204fa40c4368db7111d79fa0aff959fa3806ae0eef443fb01c3f4fcfca8a26631bae6e471f6defe03b31bb1002e9b9114a61d72
-
SSDEEP
98304:dJdmqsIXpDHpT+gj+yBBJDzqHGQqOaD4KpEU0UwoAlW:dJdPsI/H+KJDzkGtArob
Malware Config
Extracted
risepro
193.233.132.67:50500
Signatures
-
Risepro family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2092-0-0x00000000008C0000-0x0000000000E2E000-memory.dmp
Files
-
2092-0-0x00000000008C0000-0x0000000000E2E000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp·@� Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp·@� Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp·@� Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 105KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ