Analysis

  • max time kernel
    141s
  • max time network
    102s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-05-2024 14:25

General

  • Target

    ba720aa91f1d6d2b4d2207398bf1a0d34a35194c2e3f72d3b792affef2a66364.exe

  • Size

    2.2MB

  • MD5

    e421bb792990fc87a5c131d06c8f5f24

  • SHA1

    e32225a9b702c44c1ae5bbde431f6ac55e3f8434

  • SHA256

    ba720aa91f1d6d2b4d2207398bf1a0d34a35194c2e3f72d3b792affef2a66364

  • SHA512

    7d2260fc9d9db5e9c73b0936d2004987027993fb37de8db85c3b0e903baeade715efc1794262d5a60ba45471e6528849998c41617c26a05d9b55f6d595085078

  • SSDEEP

    49152:tkmKhyq24kI3qebVaeLNhVkZXCqWtO5n0b9nw5BAbeahBFItvdgHT:tkmKEqlkAbkeTuZCxtON0Zn8YfFItvOT

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba720aa91f1d6d2b4d2207398bf1a0d34a35194c2e3f72d3b792affef2a66364.exe
    "C:\Users\Admin\AppData\Local\Temp\ba720aa91f1d6d2b4d2207398bf1a0d34a35194c2e3f72d3b792affef2a66364.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3808

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3808-0-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-1-0x00000000773B6000-0x00000000773B8000-memory.dmp
    Filesize

    8KB

  • memory/3808-5-0x00000000054F0000-0x00000000054F1000-memory.dmp
    Filesize

    4KB

  • memory/3808-6-0x0000000005550000-0x0000000005551000-memory.dmp
    Filesize

    4KB

  • memory/3808-9-0x0000000005510000-0x0000000005511000-memory.dmp
    Filesize

    4KB

  • memory/3808-12-0x00000000054E0000-0x00000000054E1000-memory.dmp
    Filesize

    4KB

  • memory/3808-11-0x0000000005590000-0x0000000005591000-memory.dmp
    Filesize

    4KB

  • memory/3808-10-0x0000000005530000-0x0000000005531000-memory.dmp
    Filesize

    4KB

  • memory/3808-8-0x00000000055A0000-0x00000000055A1000-memory.dmp
    Filesize

    4KB

  • memory/3808-7-0x0000000005570000-0x0000000005571000-memory.dmp
    Filesize

    4KB

  • memory/3808-4-0x0000000005580000-0x0000000005581000-memory.dmp
    Filesize

    4KB

  • memory/3808-2-0x0000000005540000-0x0000000005541000-memory.dmp
    Filesize

    4KB

  • memory/3808-3-0x0000000005500000-0x0000000005501000-memory.dmp
    Filesize

    4KB

  • memory/3808-13-0x00000000055D0000-0x00000000055D2000-memory.dmp
    Filesize

    8KB

  • memory/3808-14-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-15-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-16-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-17-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-18-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-19-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-20-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-21-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-22-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-23-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-24-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-25-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-26-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-27-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB

  • memory/3808-28-0x0000000000AA0000-0x0000000001067000-memory.dmp
    Filesize

    5.8MB