Malware Analysis Report

2024-10-10 12:03

Sample ID 240610-k18wmseh71
Target cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a
SHA256 cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a
Tags
risepro stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a

Threat Level: Known bad

The file cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a was found to be: Known bad.

Malicious Activity Summary

risepro stealer

RisePro

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-10 09:06

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Reported

0001-01-01 00:00

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-10 09:05

Reported

2024-06-10 09:22

Platform

win10-20240404-en

Max time kernel

290s

Max time network

258s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe"

Signatures

RisePro

stealer risepro

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe

"C:\Users\Admin\AppData\Local\Temp\cdbf25ba3df2b5168fbcfc12f24c33756a1a1811de9c1af9d330d53fbfa1fc1a.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 26.178.89.13.in-addr.arpa udp
US 8.8.8.8:53 97.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 88.90.14.23.in-addr.arpa udp

Files

memory/4448-2-0x0000000000584000-0x0000000000622000-memory.dmp

memory/4448-0-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-1-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-4-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-5-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-6-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-7-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-8-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-9-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-10-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-11-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-12-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-13-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-14-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-15-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-16-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-17-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-18-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-19-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-20-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-21-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-22-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-23-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-24-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-25-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-26-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-27-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-28-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-29-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-30-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-31-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-32-0x00000000000F0000-0x0000000000622000-memory.dmp

memory/4448-33-0x00000000000F0000-0x0000000000622000-memory.dmp