Analysis
-
max time kernel
297s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20/06/2024, 23:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe
Resource
win7-20240221-en
3 signatures
300 seconds
General
-
Target
be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe
-
Size
1.3MB
-
MD5
566f6514c4a546e3bce65c4496d69179
-
SHA1
779de3817bafccc593def68ee66d24cd605d91f1
-
SHA256
be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852
-
SHA512
4cac7eae7508557d43e8c7b1048de41c8345174b61944cb0a2d123d0d63f1bbabc992b4932e3f4c253c4112d350a761ba0d52595433f5648635db397dba9f6dc
-
SSDEEP
24576:+GlP0Rg/HUGwTNKuYAvU3GO84XuBwQ1z+8gBiFARoyWg:+GlP0W/0Gwgu/MHYBl1FYoyW
Malware Config
Extracted
Family
risepro
C2
147.45.47.126:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
pid Process 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5052 be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe"C:\Users\Admin\AppData\Local\Temp\be978567d7818230f7a638b483c51a45f97efc6da70199b3669c066773e17852.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:5052