Analysis

  • max time kernel
    144s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/05/2024, 10:01

General

  • Target

    16d7507b619f3dc3b48494cc9b8867484c5406caea5f5c2bd94a4b6cf5b2f437.exe

  • Size

    3.1MB

  • MD5

    40e36e8b982915101f9f39b5d956276f

  • SHA1

    63be66b421f639fcd49ae3f4ef1269a605c5e061

  • SHA256

    16d7507b619f3dc3b48494cc9b8867484c5406caea5f5c2bd94a4b6cf5b2f437

  • SHA512

    61609079720f86c2ed7d8cba827fc0537ea544cfa0745d1ed67650f4366d5f9779fb68a89a0be2f66ef94da08ab59a1b6013cbed270f76f22d4218b1b931441b

  • SSDEEP

    49152:4Pjql7fVokDR9R+wgBhHUh052ulc7l4YE4yfojIO6jnO2Ztaen5:Ojq5VokDR9Rvq0hgdTupx2Oen5

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16d7507b619f3dc3b48494cc9b8867484c5406caea5f5c2bd94a4b6cf5b2f437.exe
    "C:\Users\Admin\AppData\Local\Temp\16d7507b619f3dc3b48494cc9b8867484c5406caea5f5c2bd94a4b6cf5b2f437.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:3096

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3096-0-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-1-0x000000007F7B0000-0x000000007FB81000-memory.dmp

    Filesize

    3.8MB

  • memory/3096-2-0x0000000077664000-0x0000000077665000-memory.dmp

    Filesize

    4KB

  • memory/3096-3-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-4-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-5-0x000000007F7B0000-0x000000007FB81000-memory.dmp

    Filesize

    3.8MB

  • memory/3096-6-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-7-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-8-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-9-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-10-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-11-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-12-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-13-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-14-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-15-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-16-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-17-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB

  • memory/3096-18-0x0000000000890000-0x00000000013F7000-memory.dmp

    Filesize

    11.4MB