Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 14:25

General

  • Target

    abe9572732c2e06ffc0346e3df5d21559a46e1a5152416a22c8765c7454dce73.exe

  • Size

    2.3MB

  • MD5

    e7913e8f677c408486e6ea3610eab838

  • SHA1

    04749833648290db5199dee421a5d6a6519e8a9e

  • SHA256

    abe9572732c2e06ffc0346e3df5d21559a46e1a5152416a22c8765c7454dce73

  • SHA512

    1761118cbfa987d7ef3c1cee3e5f9061e73fa6e8194387a40117924a0574f84065672adc748bd594cc1517a2f0dee9920a3be401b4c9ab883475e0514b90acc6

  • SSDEEP

    49152:6kmKhyq24kI3qebVs3JsvF/YLRqdgeAo3pQy2GWgBY6Cr8Vy5h4g:6kmKEqlkAbm30WRGL3t1NBY6Cr8V

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abe9572732c2e06ffc0346e3df5d21559a46e1a5152416a22c8765c7454dce73.exe
    "C:\Users\Admin\AppData\Local\Temp\abe9572732c2e06ffc0346e3df5d21559a46e1a5152416a22c8765c7454dce73.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3820

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3820-0-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-1-0x0000000077A14000-0x0000000077A16000-memory.dmp
    Filesize

    8KB

  • memory/3820-3-0x00000000051C0000-0x00000000051C1000-memory.dmp
    Filesize

    4KB

  • memory/3820-5-0x00000000051B0000-0x00000000051B1000-memory.dmp
    Filesize

    4KB

  • memory/3820-13-0x0000000005190000-0x0000000005191000-memory.dmp
    Filesize

    4KB

  • memory/3820-12-0x0000000005220000-0x0000000005221000-memory.dmp
    Filesize

    4KB

  • memory/3820-11-0x00000000051E0000-0x00000000051E1000-memory.dmp
    Filesize

    4KB

  • memory/3820-10-0x0000000005240000-0x0000000005241000-memory.dmp
    Filesize

    4KB

  • memory/3820-9-0x0000000005250000-0x0000000005251000-memory.dmp
    Filesize

    4KB

  • memory/3820-8-0x0000000005200000-0x0000000005201000-memory.dmp
    Filesize

    4KB

  • memory/3820-7-0x0000000005210000-0x0000000005211000-memory.dmp
    Filesize

    4KB

  • memory/3820-6-0x00000000051A0000-0x00000000051A1000-memory.dmp
    Filesize

    4KB

  • memory/3820-4-0x0000000005230000-0x0000000005231000-memory.dmp
    Filesize

    4KB

  • memory/3820-2-0x00000000051F0000-0x00000000051F1000-memory.dmp
    Filesize

    4KB

  • memory/3820-14-0x0000000005270000-0x0000000005272000-memory.dmp
    Filesize

    8KB

  • memory/3820-15-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-16-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-17-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-18-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-19-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-20-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-21-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-22-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-23-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-24-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-25-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-26-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-27-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-28-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB

  • memory/3820-29-0x00000000007F0000-0x0000000000DDA000-memory.dmp
    Filesize

    5.9MB