Analysis

  • max time kernel
    195s
  • max time network
    306s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-03-2024 04:48

General

  • Target

    1de47025421234e0d8b32ea3f565f013ba7c48f3039e60c52615c1491f708e96.exe

  • Size

    6.0MB

  • MD5

    4f7561f046077c4ef12cfc0f9de2f061

  • SHA1

    0c23ecc53a16ac37eee02cd4068e7703bf7a701a

  • SHA256

    1de47025421234e0d8b32ea3f565f013ba7c48f3039e60c52615c1491f708e96

  • SHA512

    f15dfab51317e7ec5d37fd20db9845a4875659ab6037b0b178f89cb2ab197edd5ad5261e2a3e94eab9090749cf83faee476859ee56d07c1ab60d1afb7ac04ede

  • SSDEEP

    98304:0G7YAdjJI7iMD00WfN/lAg7Ih3ShjxFdohx1VA+L7b91338JuABzk:r7d1ApWfvPS3e/qlP38lBA

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.116:50500

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1de47025421234e0d8b32ea3f565f013ba7c48f3039e60c52615c1491f708e96.exe
    "C:\Users\Admin\AppData\Local\Temp\1de47025421234e0d8b32ea3f565f013ba7c48f3039e60c52615c1491f708e96.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2468-0-0x0000000000920000-0x0000000001412000-memory.dmp

    Filesize

    10.9MB

  • memory/2468-1-0x00000000015B0000-0x00000000015B1000-memory.dmp

    Filesize

    4KB

  • memory/2468-2-0x00000000016F0000-0x00000000016F1000-memory.dmp

    Filesize

    4KB

  • memory/2468-3-0x0000000001700000-0x0000000001701000-memory.dmp

    Filesize

    4KB

  • memory/2468-5-0x0000000000920000-0x0000000001412000-memory.dmp

    Filesize

    10.9MB

  • memory/2468-4-0x0000000001710000-0x0000000001711000-memory.dmp

    Filesize

    4KB

  • memory/2468-6-0x0000000001720000-0x0000000001721000-memory.dmp

    Filesize

    4KB

  • memory/2468-7-0x0000000001730000-0x0000000001731000-memory.dmp

    Filesize

    4KB

  • memory/2468-8-0x0000000001740000-0x0000000001741000-memory.dmp

    Filesize

    4KB

  • memory/2468-9-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/2468-10-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2468-11-0x0000000003110000-0x0000000003111000-memory.dmp

    Filesize

    4KB

  • memory/2468-12-0x0000000003120000-0x0000000003121000-memory.dmp

    Filesize

    4KB

  • memory/2468-13-0x0000000003240000-0x0000000003241000-memory.dmp

    Filesize

    4KB

  • memory/2468-14-0x0000000003250000-0x0000000003251000-memory.dmp

    Filesize

    4KB

  • memory/2468-15-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/2468-16-0x0000000003270000-0x0000000003271000-memory.dmp

    Filesize

    4KB

  • memory/2468-17-0x0000000003290000-0x0000000003291000-memory.dmp

    Filesize

    4KB

  • memory/2468-18-0x00000000032A0000-0x00000000032A1000-memory.dmp

    Filesize

    4KB

  • memory/2468-19-0x00000000032B0000-0x00000000032B1000-memory.dmp

    Filesize

    4KB

  • memory/2468-20-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/2468-21-0x00000000032D0000-0x00000000032D1000-memory.dmp

    Filesize

    4KB

  • memory/2468-22-0x00000000032E0000-0x00000000032E1000-memory.dmp

    Filesize

    4KB

  • memory/2468-23-0x00000000032F0000-0x00000000032F1000-memory.dmp

    Filesize

    4KB

  • memory/2468-24-0x0000000003300000-0x0000000003301000-memory.dmp

    Filesize

    4KB

  • memory/2468-25-0x0000000003310000-0x0000000003311000-memory.dmp

    Filesize

    4KB

  • memory/2468-29-0x0000000000920000-0x0000000001412000-memory.dmp

    Filesize

    10.9MB