Analysis
-
max time kernel
290s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 05:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe
Resource
win7-20240221-en
3 signatures
300 seconds
General
-
Target
07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe
-
Size
1.3MB
-
MD5
7b970a78aa0cabdbddaa94146cc50589
-
SHA1
3b96c891cde702ecb8c5d68a4af1e1e6f28f5dae
-
SHA256
07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a
-
SHA512
25481e6b2d77253a495aa750e0f5c6f482e68f9c21b22fbbaee928824a0b14bc23511fc98ba4e9c695b81b4a858d9016a6c4a6a75af8c99171d25dc99ca8de70
-
SSDEEP
24576:9iF7lG/kyo3g/fQLcyI30Q04F9wQZiyIakELg8QVzU781m9hbnC:9SGkyo3gHQAyU0s9lAL8g8QB/wh
Malware Config
Extracted
Family
risepro
C2
147.45.47.126:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 29 IoCs
pid Process 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1196 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe"C:\Users\Admin\AppData\Local\Temp\07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1196