Analysis

  • max time kernel
    142s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 23:25

General

  • Target

    8bf479950a1a7fc038fc6422702b61d269e15c02b5127386185448b6541c41bc.exe

  • Size

    2.2MB

  • MD5

    769ccc1f05dbd4f51682c95b1ffd9eaa

  • SHA1

    d7759e8c9c8d8a72a792444ced1f81e11f37d850

  • SHA256

    8bf479950a1a7fc038fc6422702b61d269e15c02b5127386185448b6541c41bc

  • SHA512

    1bc6e88ef41a5d00de581e2d7380095b5926a71b483471ae414983c0036432a90375de5f50b41b099c3d7351302d8eb57176181e5f4ef0d8f871b90251ee4641

  • SSDEEP

    49152:3eF1xn14/Jkbt092J3zoL05wZ6XIotn7Tf2B/AKQgU:O1xn1bbtCyTWro9f2FU

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.93:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bf479950a1a7fc038fc6422702b61d269e15c02b5127386185448b6541c41bc.exe
    "C:\Users\Admin\AppData\Local\Temp\8bf479950a1a7fc038fc6422702b61d269e15c02b5127386185448b6541c41bc.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:548

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/548-0-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-1-0x0000000077064000-0x0000000077066000-memory.dmp

          Filesize

          8KB

        • memory/548-3-0x00000000052C0000-0x00000000052C1000-memory.dmp

          Filesize

          4KB

        • memory/548-2-0x00000000052F0000-0x00000000052F1000-memory.dmp

          Filesize

          4KB

        • memory/548-4-0x00000000052B0000-0x00000000052B1000-memory.dmp

          Filesize

          4KB

        • memory/548-5-0x0000000005330000-0x0000000005331000-memory.dmp

          Filesize

          4KB

        • memory/548-6-0x00000000052A0000-0x00000000052A1000-memory.dmp

          Filesize

          4KB

        • memory/548-7-0x0000000005310000-0x0000000005311000-memory.dmp

          Filesize

          4KB

        • memory/548-8-0x0000000005300000-0x0000000005301000-memory.dmp

          Filesize

          4KB

        • memory/548-11-0x00000000052E0000-0x00000000052E1000-memory.dmp

          Filesize

          4KB

        • memory/548-10-0x0000000005340000-0x0000000005341000-memory.dmp

          Filesize

          4KB

        • memory/548-9-0x0000000005350000-0x0000000005351000-memory.dmp

          Filesize

          4KB

        • memory/548-12-0x0000000005320000-0x0000000005321000-memory.dmp

          Filesize

          4KB

        • memory/548-13-0x0000000005290000-0x0000000005291000-memory.dmp

          Filesize

          4KB

        • memory/548-14-0x0000000005370000-0x0000000005372000-memory.dmp

          Filesize

          8KB

        • memory/548-15-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-16-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-17-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-18-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-19-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-20-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-21-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-22-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-23-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-24-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-25-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-26-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-27-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-28-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB

        • memory/548-29-0x0000000000900000-0x0000000000EAB000-memory.dmp

          Filesize

          5.7MB