Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe
Resource
win7-20240508-en
General
-
Target
e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe
-
Size
1.3MB
-
MD5
49c079bc16e468472c7d85e09f29fcb0
-
SHA1
f6c36b025532fbd3373cfb6a71ff86e60a324e3b
-
SHA256
e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66
-
SHA512
db3f44f336d4e539d0c61ec33842b24f12279680a8755c62df384fa90975a57c8e70dd192ed6a7ed19ce373b1e4233cc1618531ed7f577c3713e3f8cf95667dd
-
SSDEEP
24576:JqS/zVcdos282P6UwFsfkOvwQoRHW/nS6IHHmPjS348S:kSrudbAyUZfbvloR2/SxnKWo8
Malware Config
Extracted
risepro
147.45.47.126:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exepid process 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exepid process 1612 e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe"C:\Users\Admin\AppData\Local\Temp\e0ae8ea47d059bc89939548d36705786a5195dafe5fe23fdd4f92a5cbcbbef66.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1612
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1612-0-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-1-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-2-0x0000000001084000-0x0000000001122000-memory.dmpFilesize
632KB
-
memory/1612-4-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-5-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-6-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-7-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-8-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-9-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-10-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-11-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-12-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-13-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-14-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-15-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-16-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-17-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB
-
memory/1612-18-0x0000000000BF0000-0x0000000001122000-memory.dmpFilesize
5.2MB