Analysis

  • max time kernel
    141s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 14:52

General

  • Target

    e361f0b665390925a8fd25ceb700ae69a6a670f7cbc201d3ca669a2e71caa84d.exe

  • Size

    2.2MB

  • MD5

    557c6bc8ea6a67eab417605e287bf8a9

  • SHA1

    db2f3e913db35c2ae722caeeb8600c33a46df614

  • SHA256

    e361f0b665390925a8fd25ceb700ae69a6a670f7cbc201d3ca669a2e71caa84d

  • SHA512

    6ac111231f1db8040cbea309bc6df161868d91b9c6d8683997b811a5135bd9645ad16dd6e230b4a6b3c77c12ad50182b9b41aa5911469d4bb0da4efa28d2641a

  • SSDEEP

    49152:USUl6vD5DxN6HHLJ9tabR0c/scGLcTBb9C5f5FddcjCZ5srNiD:USSwD5Dxk2xOL0x9EdqCZONS

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.93:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e361f0b665390925a8fd25ceb700ae69a6a670f7cbc201d3ca669a2e71caa84d.exe
    "C:\Users\Admin\AppData\Local\Temp\e361f0b665390925a8fd25ceb700ae69a6a670f7cbc201d3ca669a2e71caa84d.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4836

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4836-0-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-1-0x00000000776A4000-0x00000000776A6000-memory.dmp

          Filesize

          8KB

        • memory/4836-3-0x0000000005100000-0x0000000005101000-memory.dmp

          Filesize

          4KB

        • memory/4836-6-0x00000000050E0000-0x00000000050E1000-memory.dmp

          Filesize

          4KB

        • memory/4836-5-0x0000000005170000-0x0000000005171000-memory.dmp

          Filesize

          4KB

        • memory/4836-4-0x00000000050F0000-0x00000000050F1000-memory.dmp

          Filesize

          4KB

        • memory/4836-2-0x0000000005130000-0x0000000005131000-memory.dmp

          Filesize

          4KB

        • memory/4836-7-0x0000000005150000-0x0000000005151000-memory.dmp

          Filesize

          4KB

        • memory/4836-8-0x0000000005140000-0x0000000005141000-memory.dmp

          Filesize

          4KB

        • memory/4836-9-0x0000000005190000-0x0000000005191000-memory.dmp

          Filesize

          4KB

        • memory/4836-10-0x0000000005180000-0x0000000005181000-memory.dmp

          Filesize

          4KB

        • memory/4836-11-0x0000000005120000-0x0000000005121000-memory.dmp

          Filesize

          4KB

        • memory/4836-12-0x0000000005160000-0x0000000005161000-memory.dmp

          Filesize

          4KB

        • memory/4836-13-0x00000000050D0000-0x00000000050D1000-memory.dmp

          Filesize

          4KB

        • memory/4836-14-0x00000000051B0000-0x00000000051B2000-memory.dmp

          Filesize

          8KB

        • memory/4836-15-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-16-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-17-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-18-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-19-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-20-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-21-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-22-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-23-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-24-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-25-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-26-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-27-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-28-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB

        • memory/4836-29-0x0000000000B00000-0x000000000109B000-memory.dmp

          Filesize

          5.6MB