Analysis
-
max time kernel
300s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-05-2024 23:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
300 seconds
General
-
Target
29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe
-
Size
3.0MB
-
MD5
6af5551d3f5b3d2242407a4f1409ebfb
-
SHA1
a75132c3a0ec4a027bf2066980e91f6624300976
-
SHA256
29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61
-
SHA512
ee2fa0ae19128c2f46903ef05d9d9a28a714a98791a148f11cb604d9867121422c1a48f945be5db3994a1f9071c93b61b450d77f4949b614f7262df90152abef
-
SSDEEP
98304:0wF8GteqQREbNhKIhr470UgNmS4n1Kn+PT:0BYeqQRc347OmT
Malware Config
Extracted
Family
risepro
C2
147.45.47.126:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 31 IoCs
pid Process 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2612 29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe"C:\Users\Admin\AppData\Local\Temp\29391895e04c1caa85e62d641e3cdb5aa40b20f178639c05ffdeb354f8e0ef61.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2612