Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 03:54

General

  • Target

    2144cf9c43b185215ed7d45ae42287fb15f063e9d60149f74f204f205b9e2b46.exe

  • Size

    3.1MB

  • MD5

    df2c21b208ace815329c5cc8e878d649

  • SHA1

    9651c25031da7a7af37fbede67244faf27b5a932

  • SHA256

    2144cf9c43b185215ed7d45ae42287fb15f063e9d60149f74f204f205b9e2b46

  • SHA512

    8f6ba57b49f4e82b302d011e5bd4050800d7a133c725b974aeacb049225fc14ebe0b75ffbb9eda2f42dd6c7548173a11a77181b4e101836828209ae089ddbd46

  • SSDEEP

    98304:SVONxo0Gmumd67pjS7uPYJcaThp2HSev:SMNxo0JDdkU7h2yA

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2144cf9c43b185215ed7d45ae42287fb15f063e9d60149f74f204f205b9e2b46.exe
    "C:\Users\Admin\AppData\Local\Temp\2144cf9c43b185215ed7d45ae42287fb15f063e9d60149f74f204f205b9e2b46.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:2184

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2184-0-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2184-2-0x0000000077130000-0x0000000077131000-memory.dmp

    Filesize

    4KB

  • memory/2184-3-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-4-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-6-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2184-5-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-7-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-8-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-9-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-10-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-11-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-12-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-13-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-14-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-15-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-16-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-17-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB

  • memory/2184-18-0x0000000000B50000-0x00000000016B3000-memory.dmp

    Filesize

    11.4MB