Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 17:52

General

  • Target

    tmp.exe

  • Size

    6.0MB

  • MD5

    4f7561f046077c4ef12cfc0f9de2f061

  • SHA1

    0c23ecc53a16ac37eee02cd4068e7703bf7a701a

  • SHA256

    1de47025421234e0d8b32ea3f565f013ba7c48f3039e60c52615c1491f708e96

  • SHA512

    f15dfab51317e7ec5d37fd20db9845a4875659ab6037b0b178f89cb2ab197edd5ad5261e2a3e94eab9090749cf83faee476859ee56d07c1ab60d1afb7ac04ede

  • SSDEEP

    98304:0G7YAdjJI7iMD00WfN/lAg7Ih3ShjxFdohx1VA+L7b91338JuABzk:r7d1ApWfvPS3e/qlP38lBA

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.116:50500

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3912

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3912-0-0x00000000004C0000-0x0000000000FB2000-memory.dmp

    Filesize

    10.9MB

  • memory/3912-1-0x0000000003130000-0x0000000003131000-memory.dmp

    Filesize

    4KB

  • memory/3912-3-0x0000000003250000-0x0000000003251000-memory.dmp

    Filesize

    4KB

  • memory/3912-2-0x0000000003240000-0x0000000003241000-memory.dmp

    Filesize

    4KB

  • memory/3912-4-0x00000000004C0000-0x0000000000FB2000-memory.dmp

    Filesize

    10.9MB

  • memory/3912-5-0x0000000003270000-0x0000000003271000-memory.dmp

    Filesize

    4KB

  • memory/3912-6-0x0000000003280000-0x0000000003281000-memory.dmp

    Filesize

    4KB

  • memory/3912-7-0x0000000003290000-0x0000000003291000-memory.dmp

    Filesize

    4KB

  • memory/3912-9-0x00000000032B0000-0x00000000032B1000-memory.dmp

    Filesize

    4KB

  • memory/3912-8-0x00000000032A0000-0x00000000032A1000-memory.dmp

    Filesize

    4KB

  • memory/3912-10-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/3912-11-0x00000000032D0000-0x00000000032D1000-memory.dmp

    Filesize

    4KB

  • memory/3912-12-0x00000000032E0000-0x00000000032E1000-memory.dmp

    Filesize

    4KB

  • memory/3912-13-0x00000000032F0000-0x00000000032F1000-memory.dmp

    Filesize

    4KB

  • memory/3912-14-0x0000000003300000-0x0000000003301000-memory.dmp

    Filesize

    4KB

  • memory/3912-15-0x0000000003310000-0x0000000003311000-memory.dmp

    Filesize

    4KB

  • memory/3912-16-0x0000000003320000-0x0000000003321000-memory.dmp

    Filesize

    4KB

  • memory/3912-18-0x0000000003340000-0x0000000003341000-memory.dmp

    Filesize

    4KB

  • memory/3912-17-0x0000000003330000-0x0000000003331000-memory.dmp

    Filesize

    4KB

  • memory/3912-19-0x0000000003350000-0x0000000003351000-memory.dmp

    Filesize

    4KB

  • memory/3912-21-0x0000000003370000-0x0000000003371000-memory.dmp

    Filesize

    4KB

  • memory/3912-20-0x0000000003360000-0x0000000003361000-memory.dmp

    Filesize

    4KB

  • memory/3912-22-0x0000000003380000-0x0000000003381000-memory.dmp

    Filesize

    4KB

  • memory/3912-23-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/3912-24-0x00000000033A0000-0x00000000033A1000-memory.dmp

    Filesize

    4KB

  • memory/3912-25-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/3912-26-0x00000000033C0000-0x00000000033C1000-memory.dmp

    Filesize

    4KB

  • memory/3912-27-0x00000000033D0000-0x00000000033D1000-memory.dmp

    Filesize

    4KB

  • memory/3912-31-0x00000000004C0000-0x0000000000FB2000-memory.dmp

    Filesize

    10.9MB