Analysis
-
max time kernel
140s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-05-2024 01:25
Behavioral task
behavioral1
Sample
ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exe
Resource
win10v2004-20240426-en
General
-
Target
ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exe
-
Size
2.2MB
-
MD5
62ffd8088893846bb2fae98424a04b38
-
SHA1
0c0e19acd63d9133d2b52eb956519d6544784770
-
SHA256
ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e
-
SHA512
ad33912cfcb477f29e2c20b63d842e11f1365b0e709e537e8fd54b2c4e68580d6a2274a70fc7fda009acdd8dc4dae0565df494945621849210c8f4a5c72e90f7
-
SSDEEP
49152:q5cW6j4I8Yo4aIeObcsKQ1iMlWLELziMNj3BFrSCFfZDuQYcjq:4c+I8PpIYQ1bmEXiC9BuH
Malware Config
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exe -
Processes:
resource yara_rule behavioral2/memory/1376-0-0x0000000000720000-0x0000000000DB5000-memory.dmp themida behavioral2/memory/1376-1-0x0000000000720000-0x0000000000DB5000-memory.dmp themida behavioral2/memory/1376-2-0x0000000000720000-0x0000000000DB5000-memory.dmp themida behavioral2/memory/1376-3-0x0000000000720000-0x0000000000DB5000-memory.dmp themida behavioral2/memory/1376-6-0x0000000000720000-0x0000000000DB5000-memory.dmp themida behavioral2/memory/1376-7-0x0000000000720000-0x0000000000DB5000-memory.dmp themida behavioral2/memory/1376-5-0x0000000000720000-0x0000000000DB5000-memory.dmp themida behavioral2/memory/1376-4-0x0000000000720000-0x0000000000DB5000-memory.dmp themida behavioral2/memory/1376-8-0x0000000000720000-0x0000000000DB5000-memory.dmp themida -
Processes:
ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exe"C:\Users\Admin\AppData\Local\Temp\ab2d4f2783c56b4fef3e85504ac69c1842e02e17fe745ee1c2a6d15d91bd854e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1376-0-0x0000000000720000-0x0000000000DB5000-memory.dmpFilesize
6.6MB
-
memory/1376-1-0x0000000000720000-0x0000000000DB5000-memory.dmpFilesize
6.6MB
-
memory/1376-2-0x0000000000720000-0x0000000000DB5000-memory.dmpFilesize
6.6MB
-
memory/1376-3-0x0000000000720000-0x0000000000DB5000-memory.dmpFilesize
6.6MB
-
memory/1376-6-0x0000000000720000-0x0000000000DB5000-memory.dmpFilesize
6.6MB
-
memory/1376-7-0x0000000000720000-0x0000000000DB5000-memory.dmpFilesize
6.6MB
-
memory/1376-5-0x0000000000720000-0x0000000000DB5000-memory.dmpFilesize
6.6MB
-
memory/1376-4-0x0000000000720000-0x0000000000DB5000-memory.dmpFilesize
6.6MB
-
memory/1376-8-0x0000000000720000-0x0000000000DB5000-memory.dmpFilesize
6.6MB