Malware Analysis Report

2024-10-10 12:01

Sample ID 240615-vf2a6sxgne
Target 197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41
SHA256 197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41
Tags
risepro stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41

Threat Level: Known bad

The file 197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41 was found to be: Known bad.

Malicious Activity Summary

risepro stealer

RisePro

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-15 16:56

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 16:56

Reported

2024-06-15 16:59

Platform

win7-20240220-en

Max time kernel

144s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe"

Signatures

RisePro

stealer risepro

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe

"C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe"

Network

N/A

Files

memory/2172-1-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-0-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-2-0x0000000000D64000-0x0000000000E02000-memory.dmp

memory/2172-4-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-5-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-6-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-7-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-8-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-9-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-10-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-11-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-12-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-13-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-14-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-15-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-16-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-17-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/2172-18-0x00000000008D0000-0x0000000000E02000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 16:56

Reported

2024-06-15 16:59

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

56s

Command Line

"C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe"

Signatures

RisePro

stealer risepro

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe

"C:\Users\Admin\AppData\Local\Temp\197ba70d14d8b07df4f677286c6e32395c56a90dfe59ece3ab4c29f89b94bb41.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

memory/1344-0-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-1-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-2-0x0000000000D64000-0x0000000000E02000-memory.dmp

memory/1344-4-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-5-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-6-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-7-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-8-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-9-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-10-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-11-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-12-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-13-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-14-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-15-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-16-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-17-0x00000000008D0000-0x0000000000E02000-memory.dmp

memory/1344-18-0x00000000008D0000-0x0000000000E02000-memory.dmp