Analysis
-
max time kernel
292s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04/05/2024, 22:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe
Resource
win7-20240221-en
3 signatures
300 seconds
General
-
Target
2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe
-
Size
3.0MB
-
MD5
a3ec3e168ec7be7b04c45533ef3e58b7
-
SHA1
853d6abbb27e954fd802658511317c3504235b01
-
SHA256
2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48
-
SHA512
dc04bd3577a8714dcdcdb6989e21149cd12280ab5200dad402564cc9b00c85a7719b76872d70c25502adab260115c7412caf6afa43784d2870c9eb738bec8253
-
SSDEEP
49152:FGFGToBWA9io9mkrRMMz5mvAYcZrejBStlDYUgf8MI/U9LNwvsdhod9Opq5:FAGVA9v9m8RXlmvAYcZrejM7HgzMvm
Malware Config
Extracted
Family
risepro
C2
147.45.47.93:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
pid Process 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2280 2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe"C:\Users\Admin\AppData\Local\Temp\2d1e07c69cd1e5f939b8d70c2f8c1948cf42b04bebd1c2f9b75772de8f216a48.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2280