Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-04-2024 22:30

General

  • Target

    fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe

  • Size

    2.3MB

  • MD5

    3d616a9857f08016be670ac2ec760830

  • SHA1

    974963a3875e020954e0de6dea423b9441413636

  • SHA256

    fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f

  • SHA512

    81c44f17c8e6bfdfc48b56cfe528b083c9f2015451151c1015f0c640c8a5158f34b6a09356b0ff400608e882c27ab4e0b03b704f755d4da581640c5623a12de1

  • SSDEEP

    49152:ug69SebPPiKgYyPsXPn8+5Aptz+5ZmKsEHmBmMQem4KmVz9zyut:ug69SebiMn8OOx+bmOHmmuJRNNt

Score
10/10

Malware Config

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe
    "C:\Users\Admin\AppData\Local\Temp\fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4388

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4388-0-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-1-0x0000000077BC6000-0x0000000077BC8000-memory.dmp
    Filesize

    8KB

  • memory/4388-2-0x0000000005000000-0x0000000005001000-memory.dmp
    Filesize

    4KB

  • memory/4388-12-0x0000000004FA0000-0x0000000004FA1000-memory.dmp
    Filesize

    4KB

  • memory/4388-11-0x0000000005050000-0x0000000005051000-memory.dmp
    Filesize

    4KB

  • memory/4388-10-0x0000000004FF0000-0x0000000004FF1000-memory.dmp
    Filesize

    4KB

  • memory/4388-9-0x0000000005060000-0x0000000005061000-memory.dmp
    Filesize

    4KB

  • memory/4388-8-0x0000000005030000-0x0000000005031000-memory.dmp
    Filesize

    4KB

  • memory/4388-4-0x0000000004FC0000-0x0000000004FC1000-memory.dmp
    Filesize

    4KB

  • memory/4388-7-0x0000000005010000-0x0000000005011000-memory.dmp
    Filesize

    4KB

  • memory/4388-6-0x0000000004FB0000-0x0000000004FB1000-memory.dmp
    Filesize

    4KB

  • memory/4388-5-0x0000000005040000-0x0000000005041000-memory.dmp
    Filesize

    4KB

  • memory/4388-3-0x0000000004FD0000-0x0000000004FD1000-memory.dmp
    Filesize

    4KB

  • memory/4388-13-0x0000000005080000-0x0000000005082000-memory.dmp
    Filesize

    8KB

  • memory/4388-14-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-15-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-16-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-17-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-18-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-19-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-20-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-21-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-22-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-23-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-24-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-25-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-26-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-27-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB

  • memory/4388-28-0x0000000000BD0000-0x00000000011A1000-memory.dmp
    Filesize

    5.8MB