Analysis
-
max time kernel
291s -
max time network
256s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02/05/2024, 22:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe
Resource
win7-20240419-en
3 signatures
300 seconds
General
-
Target
fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe
-
Size
3.1MB
-
MD5
bed702f6ec7bcc2aca5d64308c60b615
-
SHA1
6def58890b2242c13beb45bee56cb7e95b27b660
-
SHA256
fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34
-
SHA512
a2dbfc165bc3e9478bc332bdd95131504accb1b29a17d63c19bfef3e2bd413c2caf91e7cb6f8fa5ed976fbb5cd093bbe9f03b48243e6b1dca5a64e4bef0e6eb8
-
SSDEEP
49152:rlu95iIi7dJ97f/d96kk2uMnVIKpIjFaHQ+Isj2Pg6a1+36ROSIaWM4b/eN/:46V7nd96h2uOIKOhcQ+IxfaWDM
Malware Config
Extracted
Family
risepro
C2
147.45.47.93:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
pid Process 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 516 fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe"C:\Users\Admin\AppData\Local\Temp\fc0412dca9987c1f82d92243e157e0d54a33ef1904ab32696d5cf686ed774d34.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:516