Analysis
-
max time kernel
299s -
max time network
292s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
14/02/2024, 04:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe
Resource
win7-20231215-en
3 signatures
300 seconds
General
-
Target
a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe
-
Size
3.0MB
-
MD5
eaa9a6d2ba243567af4c323276bee334
-
SHA1
e36055a0d6bfb7ca4c8b6289d257cbadc7c3ac42
-
SHA256
a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881
-
SHA512
c46a49ce909b74d53cf5dee749bb6d39ddf750cdf74ee70d1fd0df33860971c08b5f393781d997f16ebc94d389d0fce00f569a753e69c8a56f9ec3f1a5f0387e
-
SSDEEP
49152:FQQNqn9L3M56JX3Ualq5tIktd9JLzAsQ5b+Y5nS5gWh7kFHTaRRSJijaerJhYj:FQAIQ2nDItIk5Joow+ZiFccpeFe
Malware Config
Extracted
Family
risepro
C2
193.233.132.62
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 31 IoCs
pid Process 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 528 a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe"C:\Users\Admin\AppData\Local\Temp\a0d9577ffcf5c76383a20653b4abd06385ccd6fe5a8e7c48ac2652cac249c881.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:528