Malware Analysis Report

2024-10-10 11:58

Sample ID 240615-vbr7psxfka
Target 9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6
SHA256 9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6
Tags
risepro stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6

Threat Level: Known bad

The file 9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6 was found to be: Known bad.

Malicious Activity Summary

risepro stealer

RisePro

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-15 16:49

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 16:49

Reported

2024-06-15 16:51

Platform

win7-20240611-en

Max time kernel

150s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe"

Signatures

RisePro

stealer risepro

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe

"C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe"

Network

N/A

Files

memory/3020-1-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-0-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-2-0x0000000000D24000-0x0000000000DC2000-memory.dmp

memory/3020-4-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-5-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-6-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-7-0x0000000000D24000-0x0000000000DC2000-memory.dmp

memory/3020-8-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-9-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-10-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-11-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-12-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-13-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-14-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-15-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-16-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-17-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-18-0x0000000000890000-0x0000000000DC2000-memory.dmp

memory/3020-19-0x0000000000890000-0x0000000000DC2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 16:49

Reported

2024-06-15 16:51

Platform

win10v2004-20240611-en

Max time kernel

149s

Max time network

97s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe"

Signatures

RisePro

stealer risepro

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe

"C:\Users\Admin\AppData\Local\Temp\9db803010a1beb311d8ba5b5a7aae96cb62d181f9d6b1584936373fcc74388a6.exe"

Network

Country Destination Domain Proto
BE 23.41.178.67:443 www.bing.com tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 105.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 67.178.41.23.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 17.143.109.104.in-addr.arpa udp
US 8.8.8.8:53 145.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp

Files

memory/1580-1-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-2-0x0000000000E34000-0x0000000000ED2000-memory.dmp

memory/1580-0-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-4-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-5-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-6-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-7-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-8-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-9-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-10-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-11-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-12-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-13-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-14-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-15-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-16-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-17-0x00000000009A0000-0x0000000000ED2000-memory.dmp

memory/1580-18-0x00000000009A0000-0x0000000000ED2000-memory.dmp