Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2024, 19:28

General

  • Target

    4d6e2c524ee29982d3f84b58e3c73a2b77ba1d69db590d47ff2c8158ecab3ae8.exe

  • Size

    1.9MB

  • MD5

    3be6a1b3d7827910300730e087f69ee3

  • SHA1

    7b97a23a2b16794b1456bdfb47f64238ce3402bf

  • SHA256

    4d6e2c524ee29982d3f84b58e3c73a2b77ba1d69db590d47ff2c8158ecab3ae8

  • SHA512

    48b78fb1690208b48408c735069a08eac31c85039d56f2ad94cddb99ed30de59fb5018ce8912c0b08f0d8cf3c692d739e37b3aeb829f2ab29395e090d518351d

  • SSDEEP

    49152:By5er9fzkC23IfYxG/Qr8Yx3c8+01Pnb+fP0pW4xKu1cR:B4Qu+/Q999nqfPEWqN1

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d6e2c524ee29982d3f84b58e3c73a2b77ba1d69db590d47ff2c8158ecab3ae8.exe
    "C:\Users\Admin\AppData\Local\Temp\4d6e2c524ee29982d3f84b58e3c73a2b77ba1d69db590d47ff2c8158ecab3ae8.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1836-0-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-1-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-2-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-3-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-4-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-5-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-6-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-7-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-8-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-9-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-10-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-11-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-12-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-13-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB

  • memory/1836-14-0x0000000000920000-0x0000000000E13000-memory.dmp

    Filesize

    4.9MB