Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 12:50

General

  • Target

    be6af810785d957322e2abc90cccfb9e42ba46808b1518e742a1313925267fda.exe

  • Size

    2.2MB

  • MD5

    8aa7d0bfdd9dca71dd0026c01bbac9d6

  • SHA1

    72cb3100e0eac69761c6c657950df27161606c69

  • SHA256

    be6af810785d957322e2abc90cccfb9e42ba46808b1518e742a1313925267fda

  • SHA512

    6bc655135ae80579ce74409545a777850d1a87e3d4404df6562528b2f62252c913c961b7e96affb954739f427cf85e5d8b6b6a6f1e616939cbc346d4205c6b5c

  • SSDEEP

    49152:bkmKhyq24kI3qebVaVAOMBoOobKLJT0TUfWO9IRqpZoVZQ6A:bkmKEqlkAbkVAE5G1TiUfWuZpwe6

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be6af810785d957322e2abc90cccfb9e42ba46808b1518e742a1313925267fda.exe
    "C:\Users\Admin\AppData\Local\Temp\be6af810785d957322e2abc90cccfb9e42ba46808b1518e742a1313925267fda.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4088-0-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-1-0x0000000077A14000-0x0000000077A16000-memory.dmp

    Filesize

    8KB

  • memory/4088-2-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

    Filesize

    4KB

  • memory/4088-5-0x0000000004D50000-0x0000000004D51000-memory.dmp

    Filesize

    4KB

  • memory/4088-12-0x0000000004D40000-0x0000000004D41000-memory.dmp

    Filesize

    4KB

  • memory/4088-11-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

    Filesize

    4KB

  • memory/4088-10-0x0000000004D90000-0x0000000004D91000-memory.dmp

    Filesize

    4KB

  • memory/4088-9-0x0000000004D70000-0x0000000004D71000-memory.dmp

    Filesize

    4KB

  • memory/4088-8-0x0000000004E00000-0x0000000004E01000-memory.dmp

    Filesize

    4KB

  • memory/4088-7-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

    Filesize

    4KB

  • memory/4088-6-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

    Filesize

    4KB

  • memory/4088-4-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

    Filesize

    4KB

  • memory/4088-3-0x0000000004D60000-0x0000000004D61000-memory.dmp

    Filesize

    4KB

  • memory/4088-13-0x0000000004E20000-0x0000000004E22000-memory.dmp

    Filesize

    8KB

  • memory/4088-14-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-15-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-16-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-17-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-18-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-19-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-20-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-21-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-22-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-23-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-24-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-25-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-26-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-27-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB

  • memory/4088-28-0x00000000003D0000-0x0000000000991000-memory.dmp

    Filesize

    5.8MB