Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/06/2024, 11:50

General

  • Target

    1ac50caaeef8ded3fddc4f252a76ea7cb976fa40a89cff18ce3609b477d079db.exe

  • Size

    1.3MB

  • MD5

    320cb7b2c8d02a8b349e0746d5f1a412

  • SHA1

    e16bbb45fa721466543d8ff20a8d65e04e10c37e

  • SHA256

    1ac50caaeef8ded3fddc4f252a76ea7cb976fa40a89cff18ce3609b477d079db

  • SHA512

    7c53658ac64157f9679405104af7cb0585294de4cb1fb98760909726c9924d127fd250d24463c283703ec90654b6f4abd97b168a8ea7f5ae061fcbfeeb9f2358

  • SSDEEP

    24576:D+zDLdvnqngqbwEzjq8R5wfYOUlzAJq7DEfsqpwQzCN2K3yWds0JkKyVvMsFk5PJ:iL1gVR5wfYOkzGflplradsLxvFkBP0ne

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ac50caaeef8ded3fddc4f252a76ea7cb976fa40a89cff18ce3609b477d079db.exe
    "C:\Users\Admin\AppData\Local\Temp\1ac50caaeef8ded3fddc4f252a76ea7cb976fa40a89cff18ce3609b477d079db.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:2184
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3400

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2184-0-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-1-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-2-0x0000000000D64000-0x0000000000E02000-memory.dmp

      Filesize

      632KB

    • memory/2184-4-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-5-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-6-0x0000000000D64000-0x0000000000E02000-memory.dmp

      Filesize

      632KB

    • memory/2184-7-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-8-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-9-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-10-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-11-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-12-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-13-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-14-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-15-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-16-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-17-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB

    • memory/2184-18-0x00000000008D0000-0x0000000000E02000-memory.dmp

      Filesize

      5.2MB