Behavioral task
behavioral1
Sample
1720-0-0x0000000000F60000-0x00000000014CE000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1720-0-0x0000000000F60000-0x00000000014CE000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
1720-0-0x0000000000F60000-0x00000000014CE000-memory.dmp
-
Size
5.4MB
-
MD5
0a971066be943587c643e8c5873bef6c
-
SHA1
b2ca0d6aad9bf1be016ab2bed3740767c02ec10c
-
SHA256
dab33ad45a651cc03555efa0aa604742639cf365797b6aca009b1b83bf074bcc
-
SHA512
8ffbdd1892a689499f5666b5dca94b5b369a6da2b32e91943ad8bc7585225f4dd6874877335d263fbe3ee91699001dff2d1da4911f597a0154efc7677a33d350
-
SSDEEP
98304:0bhskR6TZmC7T0WPC8SR2fqFHRQqWc5FQjzU0UwoAlT:0bhTR6rrCX2fqxRt2roW
Malware Config
Extracted
risepro
193.233.132.67:50500
Signatures
-
Risepro family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1720-0-0x0000000000F60000-0x00000000014CE000-memory.dmp
Files
-
1720-0-0x0000000000F60000-0x00000000014CE000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp·@� Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp·@� Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp·@� Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 105KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ