Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 11:22
Behavioral task
behavioral1
Sample
6c6a6136030cabb7f08e8d2df789cbc2.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
6c6a6136030cabb7f08e8d2df789cbc2.exe
-
Size
2.2MB
-
MD5
6c6a6136030cabb7f08e8d2df789cbc2
-
SHA1
b55dbf0e29bfd61ec9092f62420f9c08275974b9
-
SHA256
402ff605d7f23f20e253e13b8cb1eb7b5b763a00311deba3cf13c9646ae1f397
-
SHA512
afeca3d130e1af378faac023718b03ba5d45b8a5307b4b0f2b8081ffe8b85f95b7201f3932bfc9e9c05519ef6ccd64a79e34de9e5cd8f775fee126baeb61877a
-
SSDEEP
49152:KHlAEi8etVYMUgCHhvcULUuNLP31VmRLVSQE2sCpdN:KHlJWYMfCHt4uVlVkICpdN
Malware Config
Extracted
Family
risepro
C2
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6c6a6136030cabb7f08e8d2df789cbc2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6c6a6136030cabb7f08e8d2df789cbc2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6c6a6136030cabb7f08e8d2df789cbc2.exe -
resource yara_rule behavioral1/memory/1040-0-0x0000000000A90000-0x0000000001115000-memory.dmp themida behavioral1/memory/1040-2-0x0000000000A90000-0x0000000001115000-memory.dmp themida behavioral1/memory/1040-4-0x0000000000A90000-0x0000000001115000-memory.dmp themida behavioral1/memory/1040-3-0x0000000000A90000-0x0000000001115000-memory.dmp themida behavioral1/memory/1040-1-0x0000000000A90000-0x0000000001115000-memory.dmp themida behavioral1/memory/1040-5-0x0000000000A90000-0x0000000001115000-memory.dmp themida behavioral1/memory/1040-6-0x0000000000A90000-0x0000000001115000-memory.dmp themida behavioral1/memory/1040-8-0x0000000000A90000-0x0000000001115000-memory.dmp themida behavioral1/memory/1040-7-0x0000000000A90000-0x0000000001115000-memory.dmp themida behavioral1/memory/1040-9-0x0000000000A90000-0x0000000001115000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6c6a6136030cabb7f08e8d2df789cbc2.exe