Analysis
-
max time kernel
146s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe
Resource
win7-20240611-en
General
-
Target
9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe
-
Size
1.3MB
-
MD5
c1f99b3d841d966eda77603c0b1c00e1
-
SHA1
8dbca7bfcecd1ec70a01ee74939927ddf3ccbeb4
-
SHA256
9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb
-
SHA512
fcee9105efb0b1d2fe693afde26b2f4e920b9219177db4e3da4d899709642788a25065c2e0c3136bd23792e1138f019878337bff782f654be35a13e6282aeeb5
-
SSDEEP
24576:8SD2Y3T3gZsCiGsev5lFjCRWVCAscwQhdiyIakEL/9Be96ENME:8SD2O3esCiGHvHFmVrclh8L8/fMp
Malware Config
Extracted
risepro
147.45.47.126:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exepid process 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exepid process 408 9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe"C:\Users\Admin\AppData\Local\Temp\9964280168e5ee1d53f07e96367fa9fc75a3ae0a9e9eec970f076a8e552188fb.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:408
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/408-1-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-2-0x0000000001024000-0x00000000010C2000-memory.dmpFilesize
632KB
-
memory/408-4-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-5-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-6-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-7-0x0000000001024000-0x00000000010C2000-memory.dmpFilesize
632KB
-
memory/408-8-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-9-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-10-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-11-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-12-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-13-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-14-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-15-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-16-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-17-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-18-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB
-
memory/408-19-0x0000000000B90000-0x00000000010C2000-memory.dmpFilesize
5.2MB