Analysis
-
max time kernel
298s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 22:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe
Resource
win7-20240508-en
3 signatures
300 seconds
General
-
Target
821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe
-
Size
1.3MB
-
MD5
718b82b03c11ed3b641f2072564930a0
-
SHA1
44825183068bbb373955c43744f7b0eecdd7639d
-
SHA256
821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8
-
SHA512
48d57b0f6051420d4f56600034bca18c51809e037d981c0611de6075d2b68b460d24a2b61214a79675f31ada7ff43dd74a4a55436d7b48107e1c5205ebcc9bb8
-
SSDEEP
24576:B577H2fTZFOU/mYDtwvaoy7hl9IU7wQCN2K3yWds0JkKyV4jZ8uUXbmNrUNQz:B577H2LZFvu6muhjIU7lPadsLGt8uwS5
Malware Config
Extracted
Family
risepro
C2
147.45.47.126:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
pid Process 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1232 821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe"C:\Users\Admin\AppData\Local\Temp\821d95513d52aaac3a3de60f7fff61170311011fd5d42c0ab70bbe98fc19afd8.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1232