Analysis
-
max time kernel
299s -
max time network
188s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-06-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe
Resource
win7-20240221-en
General
-
Target
07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe
-
Size
1.3MB
-
MD5
7b970a78aa0cabdbddaa94146cc50589
-
SHA1
3b96c891cde702ecb8c5d68a4af1e1e6f28f5dae
-
SHA256
07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a
-
SHA512
25481e6b2d77253a495aa750e0f5c6f482e68f9c21b22fbbaee928824a0b14bc23511fc98ba4e9c695b81b4a858d9016a6c4a6a75af8c99171d25dc99ca8de70
-
SSDEEP
24576:9iF7lG/kyo3g/fQLcyI30Q04F9wQZiyIakELg8QVzU781m9hbnC:9SGkyo3gHQAyU0s9lAL8g8QB/wh
Malware Config
Extracted
risepro
147.45.47.126:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
Processes:
07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exepid process 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exepid process 4460 07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe"C:\Users\Admin\AppData\Local\Temp\07b30fdbba6bacfaac454f1288e6fcdc0d8aae3f0d0cabba177100e7fb44400a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4460
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4460-0-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-1-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-2-0x00000000007C4000-0x0000000000862000-memory.dmpFilesize
632KB
-
memory/4460-4-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-5-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-6-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-7-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-8-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-9-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-10-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-11-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-12-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-13-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-14-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-15-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-16-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-17-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-18-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-19-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-20-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-21-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-22-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-23-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-24-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-25-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-26-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-27-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-28-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-29-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-30-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-31-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-32-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB
-
memory/4460-33-0x0000000000330000-0x0000000000862000-memory.dmpFilesize
5.2MB