Malware Analysis Report

2024-10-10 12:02

Sample ID 240615-mcptzazhmn
Target 28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9
SHA256 28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9
Tags
risepro stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9

Threat Level: Known bad

The file 28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9 was found to be: Known bad.

Malicious Activity Summary

risepro stealer

RisePro

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-15 10:19

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 10:19

Reported

2024-06-15 10:22

Platform

win7-20240611-en

Max time kernel

141s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe"

Signatures

RisePro

stealer risepro

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe

"C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe"

Network

N/A

Files

memory/2172-0-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-1-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-2-0x0000000001124000-0x00000000011C2000-memory.dmp

memory/2172-4-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-5-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-6-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-7-0x0000000001124000-0x00000000011C2000-memory.dmp

memory/2172-8-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-9-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-10-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-11-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-12-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-13-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-14-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-15-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-16-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-17-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-18-0x0000000000C90000-0x00000000011C2000-memory.dmp

memory/2172-19-0x0000000000C90000-0x00000000011C2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 10:19

Reported

2024-06-15 10:21

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe"

Signatures

RisePro

stealer risepro

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe

"C:\Users\Admin\AppData\Local\Temp\28db326129892d1b616892eb87a9b3b541eaf144b5774426b914c71ebf62ece9.exe"

Network

Files

memory/2396-0-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-2-0x0000000000654000-0x00000000006F2000-memory.dmp

memory/2396-1-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-4-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-5-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-6-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-7-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-8-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-9-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-10-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-11-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-12-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-13-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-14-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-15-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-16-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-17-0x00000000001C0000-0x00000000006F2000-memory.dmp

memory/2396-18-0x00000000001C0000-0x00000000006F2000-memory.dmp