Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    18/06/2024, 10:24

General

  • Target

    19a38fb0ae80e6087243d17969ebdd64993df535d60719e8f8ae4d7b5af92018.exe

  • Size

    1.3MB

  • MD5

    cee50d1313972e71e99aa08ec07031ae

  • SHA1

    04d53ac8f3d3c4123a3ea274e00bcbb219a698c1

  • SHA256

    19a38fb0ae80e6087243d17969ebdd64993df535d60719e8f8ae4d7b5af92018

  • SHA512

    46fcf97f9ca6a5f229c0fe3481e6f6b0e7f80f92aeb290b460610a0c81ec3fa638ec6ac1103cdd9af97fd11b55f87f58e99f96b586e5ca8c5e6ae9dabe24c15c

  • SSDEEP

    24576:BwtED+lcsbq0ktTdEwGgU4+/ywQRBaWnBCqcZn+BY2:B/+csmLhdU5/ylRBaWnt

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19a38fb0ae80e6087243d17969ebdd64993df535d60719e8f8ae4d7b5af92018.exe
    "C:\Users\Admin\AppData\Local\Temp\19a38fb0ae80e6087243d17969ebdd64993df535d60719e8f8ae4d7b5af92018.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:1312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1312-2-0x0000000001214000-0x00000000012B2000-memory.dmp

    Filesize

    632KB

  • memory/1312-1-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-0-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-4-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-5-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-6-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-7-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-8-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-9-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-10-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-11-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-12-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-13-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-14-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-15-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-16-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-17-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB

  • memory/1312-18-0x0000000000D80000-0x00000000012B2000-memory.dmp

    Filesize

    5.2MB