Analysis
-
max time kernel
291s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c.exe
Resource
win7-20240215-en
General
-
Target
e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c.exe
-
Size
2.2MB
-
MD5
649b39e3c10a60329707e77c29230eb6
-
SHA1
a192013616953899cc5f2ecf0f41e27b4452740a
-
SHA256
e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c
-
SHA512
9f5ff441913bfc63d5ed211be2d7af7b3a77243bcef45d9d21740b6b44a5fdbd49b79bd1d0544e57f03c05e568be53a6d7720b050275610e9ef1a8e8bc47b545
-
SSDEEP
49152:BykbxeeGsEGP/Q0DlXdxg6OzuRvIKH7iQuU/7hQ+juUz2:Nb4esO/HG6IKH7Tjhvu2
Malware Config
Extracted
risepro
193.233.132.62:50500
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1924 e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1924 e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c.exe"C:\Users\Admin\AppData\Local\Temp\e07f724440fa750b140aea17c0fdee6c166c4f289fa7aeaea251468eb937a36c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1924