Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe
Resource
win10v2004-20240426-en
General
-
Target
7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe
-
Size
2.3MB
-
MD5
d02b19ee489964c8e9d15a4198b4efee
-
SHA1
252f44d1881a0e8efe0fd0f581e46ba749122ec6
-
SHA256
7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8
-
SHA512
875f73eb291eac5ed7257bdc2a52953fa6eb4fade8c1be6be7464f2aaa4030a738799f1ee8c1c4a245e5a00104189fc1c4e56320cbf48b7f18791ce8432ee24e
-
SSDEEP
49152:bkmKhyq24kI3qebVaqQGu6Rfcunpgc+t3O9oMowp/WByjKbgS2C3Nf:bkmKEqlkAbk7zcPpgLCooWaRSFd
Malware Config
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine 7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exepid process 2420 7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exepid process 2420 7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe 2420 7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe"C:\Users\Admin\AppData\Local\Temp\7efb08802636da48fc3c69ee275295022c55c76928dc552726f79b5ee38203c8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2420-0-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-1-0x0000000077634000-0x0000000077636000-memory.dmpFilesize
8KB
-
memory/2420-13-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/2420-12-0x0000000004B90000-0x0000000004B91000-memory.dmpFilesize
4KB
-
memory/2420-11-0x0000000004B50000-0x0000000004B51000-memory.dmpFilesize
4KB
-
memory/2420-10-0x0000000004BB0000-0x0000000004BB1000-memory.dmpFilesize
4KB
-
memory/2420-9-0x0000000004BC0000-0x0000000004BC1000-memory.dmpFilesize
4KB
-
memory/2420-8-0x0000000004B70000-0x0000000004B71000-memory.dmpFilesize
4KB
-
memory/2420-7-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/2420-6-0x0000000004B10000-0x0000000004B11000-memory.dmpFilesize
4KB
-
memory/2420-5-0x0000000004B20000-0x0000000004B21000-memory.dmpFilesize
4KB
-
memory/2420-4-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/2420-3-0x0000000004B30000-0x0000000004B31000-memory.dmpFilesize
4KB
-
memory/2420-2-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/2420-14-0x0000000004BE0000-0x0000000004BE2000-memory.dmpFilesize
8KB
-
memory/2420-15-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-16-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-17-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-18-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-19-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-20-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-21-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-22-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-23-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-24-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-25-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-26-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-27-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-28-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB
-
memory/2420-29-0x0000000000470000-0x0000000000A52000-memory.dmpFilesize
5.9MB