Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-04-2024 19:51

General

  • Target

    afc3f774a75831e7ec540efc210d21375c8278ea4a4cfa24ce6cda6cfde7e34b.exe

  • Size

    3.0MB

  • MD5

    3e33fa8194c795c9e848ea25d203a47c

  • SHA1

    b8411a452b8d9351f0a01de5e5c3a6d36eb025f2

  • SHA256

    afc3f774a75831e7ec540efc210d21375c8278ea4a4cfa24ce6cda6cfde7e34b

  • SHA512

    28a5afa851ea93231ffd45720c722de2db8b9480a5b55018579fc4740ae7b870db3a733d2b098b25d176698e1f6fd9ae4ab27c6b9b8e87a36fb74a12922dc88e

  • SSDEEP

    98304:VLHhu8kuyLysItepNV7k7Xmv8hr7stGDT3:VLB3kjfIoNhk7XAIEtST

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afc3f774a75831e7ec540efc210d21375c8278ea4a4cfa24ce6cda6cfde7e34b.exe
    "C:\Users\Admin\AppData\Local\Temp\afc3f774a75831e7ec540efc210d21375c8278ea4a4cfa24ce6cda6cfde7e34b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    PID:3304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3304-0-0x0000000000500000-0x0000000000CA7000-memory.dmp

    Filesize

    7.7MB

  • memory/3304-1-0x0000000000500000-0x0000000000CA7000-memory.dmp

    Filesize

    7.7MB

  • memory/3304-2-0x0000000000500000-0x0000000000CA7000-memory.dmp

    Filesize

    7.7MB

  • memory/3304-3-0x0000000000500000-0x0000000000CA7000-memory.dmp

    Filesize

    7.7MB

  • memory/3304-4-0x0000000000500000-0x0000000000CA7000-memory.dmp

    Filesize

    7.7MB

  • memory/3304-5-0x0000000000500000-0x0000000000CA7000-memory.dmp

    Filesize

    7.7MB

  • memory/3304-6-0x0000000000500000-0x0000000000CA7000-memory.dmp

    Filesize

    7.7MB

  • memory/3304-7-0x0000000000500000-0x0000000000CA7000-memory.dmp

    Filesize

    7.7MB

  • memory/3304-8-0x0000000000500000-0x0000000000CA7000-memory.dmp

    Filesize

    7.7MB