Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 19:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231129-en
3 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.3MB
-
MD5
e102fe84451fa18c107fcada5c6baa92
-
SHA1
f5add1918b1d81e044dccf9cdbd92ff9aa78a620
-
SHA256
28a3a0f8cc6cb42927aa1aa81a077020748a734acfe46412f06153deb23fa1de
-
SHA512
7a612cc1c4a7518f2de32357115acb6d7948679ece9a1a5c241ab6764fd6345344050d633796aedb7bf9d44def8b54f0129576a6995abb660e192e6f28cc4873
-
SSDEEP
49152:qkQTAnh26CWxHi+q69KIuPtu8oc8xLpENEVABEZDaaDPV4E2rfV8bwVZzuuPB:qanh2WHtq69nR8oZLqbGXPKE2rswVou5
Malware Config
Extracted
Family
risepro
C2
109.107.182.26:50500
Signatures
-
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/5040-0-0x0000000005520000-0x0000000005756000-memory.dmp net_reactor behavioral2/memory/5040-6-0x00000000052E0000-0x0000000005514000-memory.dmp net_reactor behavioral2/memory/5040-13-0x0000000002DF0000-0x0000000004DF0000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5040 set thread context of 4792 5040 file.exe 50 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50 PID 5040 wrote to memory of 4792 5040 file.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4792
-