Analysis

  • max time kernel
    114s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2024 01:20

General

  • Target

    5ff913c9def6f766cfdff7c65d82a684e5dec29b65f24574c4e80c5655d0dc95.exe

  • Size

    6.3MB

  • MD5

    61f68a3fe16a68260f185579bcf6d7ab

  • SHA1

    072f761709ec6fceec17187e7caae058d3955e94

  • SHA256

    5ff913c9def6f766cfdff7c65d82a684e5dec29b65f24574c4e80c5655d0dc95

  • SHA512

    df0a48a4534623bf822ca367f33b541829ef118576492290057103f1a32bdf9a4e8400c9ca5c8e8e6f46cf323bf8c8ed51aaf95f16b5921fe6cf0dcbe393b207

  • SSDEEP

    196608:FTX0QyhZKEv000yJFFY9/HBI9gVIxOsW1OLugGjlhXWkVhw3q:pe6hhI9QWVieMm3

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ff913c9def6f766cfdff7c65d82a684e5dec29b65f24574c4e80c5655d0dc95.exe
    "C:\Users\Admin\AppData\Local\Temp\5ff913c9def6f766cfdff7c65d82a684e5dec29b65f24574c4e80c5655d0dc95.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4076
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3528 --field-trial-handle=2256,i,6057863739127169200,6895476048812676039,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3036

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4076-1-0x0000000000740000-0x0000000001426000-memory.dmp

      Filesize

      12.9MB

    • memory/4076-2-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/4076-0-0x0000000003570000-0x0000000003571000-memory.dmp

      Filesize

      4KB

    • memory/4076-3-0x00000000035B0000-0x00000000035B1000-memory.dmp

      Filesize

      4KB

    • memory/4076-5-0x0000000000740000-0x0000000001426000-memory.dmp

      Filesize

      12.9MB

    • memory/4076-4-0x00000000035C0000-0x00000000035C1000-memory.dmp

      Filesize

      4KB

    • memory/4076-6-0x00000000035D0000-0x00000000035D1000-memory.dmp

      Filesize

      4KB

    • memory/4076-7-0x00000000035E0000-0x00000000035E1000-memory.dmp

      Filesize

      4KB

    • memory/4076-13-0x0000000000740000-0x0000000001426000-memory.dmp

      Filesize

      12.9MB

    • memory/4076-15-0x0000000000740000-0x0000000001426000-memory.dmp

      Filesize

      12.9MB