Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 07:29
Behavioral task
behavioral1
Sample
43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe
Resource
win10v2004-20240412-en
7 signatures
150 seconds
General
-
Target
43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe
-
Size
4.2MB
-
MD5
12d7b7b63d8ea8b173b69246184905d6
-
SHA1
0eb454a9d47907b5b761af269568a8b6a0fcc21b
-
SHA256
43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab
-
SHA512
32b45e13e189b6e482214db1be6e35fc071ae06ebde986f71ba8c8ab792efcfb5cd2e50ff6275ae0831857be031ee8ccc6bc36e77caa1290e1847566e6886e41
-
SSDEEP
49152:HyRpsgSF3ehDeD8Q3BSgwv3oQ631u+xq3Wr1OyT6m51LKPT9ahmCX49Ad3W6t0Sn:Hs23qc8QYpoQqo4JuT9WmCouW6t0sP
Malware Config
Extracted
Family
risepro
C2
193.233.132.253:50500
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe -
resource yara_rule behavioral1/memory/4436-0-0x0000000000680000-0x00000000010BE000-memory.dmp themida behavioral1/memory/4436-1-0x0000000000680000-0x00000000010BE000-memory.dmp themida behavioral1/memory/4436-14-0x0000000000680000-0x00000000010BE000-memory.dmp themida behavioral1/memory/4436-16-0x0000000000680000-0x00000000010BE000-memory.dmp themida behavioral1/memory/4436-18-0x0000000000680000-0x00000000010BE000-memory.dmp themida behavioral1/memory/4436-17-0x0000000000680000-0x00000000010BE000-memory.dmp themida behavioral1/memory/4436-19-0x0000000000680000-0x00000000010BE000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4436 43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4436 43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe 4436 43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe"C:\Users\Admin\AppData\Local\Temp\43c810e27af8bf4a41c5cbe94f39bcaa24b92c7f01760e41698156c52a6ff8ab.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4436