Analysis
-
max time kernel
129s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2024 08:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.4MB
-
MD5
78381401bb3b7d0af0d2c7896003f7bf
-
SHA1
b7684564b7ede67faae6773030960a1f3e68737a
-
SHA256
1e612571131d0b3cbfa9b5b60865815e1ec79703920d6834509e6792d068a49a
-
SHA512
68e613b966346f09245502a995127b476a0456d772248987718a76dd59109829c6836191b416263de7942528da3c0260a6f489c9fdd5fe2c52eb3597af422ecc
-
SSDEEP
49152:fPd3Q5c3zVS10KM+q7mXgFLK6lmluHQPNaATXG63btgjaTqM:dQ5cpS1Hqe/NaAK63BgjaTqM
Malware Config
Extracted
Family
risepro
C2
193.233.132.67:5000
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2064 set thread context of 3100 2064 file.exe 84 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84 PID 2064 wrote to memory of 3100 2064 file.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3100
-