Analysis

  • max time kernel
    155s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 23:36

General

  • Target

    4ba8be19b243c1ddcefe359a35c8bd3f8969cae00fffe575a44f60f98f473bad.exe

  • Size

    1.8MB

  • MD5

    e55eb64fd35c5790478f782d11de4bbb

  • SHA1

    e53a430691b81165a390f68650a1f233a261bd6c

  • SHA256

    4ba8be19b243c1ddcefe359a35c8bd3f8969cae00fffe575a44f60f98f473bad

  • SHA512

    008e686672ac4d3f171f8c5483403a2fc7de857b19832ea4136ba7581a85739efeab534c7e45856622f9ca9312db3e48ed2a9c9c1b7d0c16147506be684a1d10

  • SSDEEP

    49152:pEuHG/1IKIXNJUQF5y3aCIH/hoE8J0m2q3tVPy:SuH2IDUQzy398pIVZV6

Score
10/10

Malware Config

Extracted

Family

risepro

C2

193.233.132.62:50500

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ba8be19b243c1ddcefe359a35c8bd3f8969cae00fffe575a44f60f98f473bad.exe
    "C:\Users\Admin\AppData\Local\Temp\4ba8be19b243c1ddcefe359a35c8bd3f8969cae00fffe575a44f60f98f473bad.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:1424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1424-0-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-1-0x00000000775A2000-0x00000000775A3000-memory.dmp

    Filesize

    4KB

  • memory/1424-2-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-3-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-4-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-5-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-6-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-7-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-8-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-9-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-10-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-11-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-12-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-13-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-14-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-15-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-16-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB

  • memory/1424-17-0x00000000007D0000-0x0000000000CEE000-memory.dmp

    Filesize

    5.1MB