Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe
Resource
win7-20240508-en
General
-
Target
bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe
-
Size
1.3MB
-
MD5
660cb6db24cfb78f6c3ea6b3b6b51216
-
SHA1
7bfd0ed1e43f4fb0aae20401ac813cbe682b8746
-
SHA256
bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234
-
SHA512
9ef37a2a9ceaa453c1a8251589d44650e36b67df59659f60677b3cf6871542c6fd0a7b9b8a69357e3fd723cbdc618b9b38a8fa166c59f7d70f17336e10d04529
-
SSDEEP
24576:JHOKxDwPfUv2yJqn7w4lZ5wQ9iyIakELzGkjZbmNrU0W0R1AQ:J9Xv26WE25lcL86sZSgunAQ
Malware Config
Extracted
risepro
147.45.47.126:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exepid process 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exepid process 2132 bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe"C:\Users\Admin\AppData\Local\Temp\bf0030cf20c5a49f387fa3283d56bed2fcc9f88ed174f0c455f3665d1017d234.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2132
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2132-2-0x00000000011F4000-0x0000000001292000-memory.dmpFilesize
632KB
-
memory/2132-1-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-0-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-4-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-5-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-6-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-7-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-8-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-9-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-10-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-11-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-12-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-13-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-14-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-15-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-16-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-17-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB
-
memory/2132-18-0x0000000000D60000-0x0000000001292000-memory.dmpFilesize
5.2MB