Analysis
-
max time kernel
298s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 23:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe
Resource
win7-20240220-en
3 signatures
300 seconds
General
-
Target
f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe
-
Size
1.3MB
-
MD5
e7db081ba67e2d893fd4bfc7e4820c95
-
SHA1
32d6c73f7f285e79129988b0f8af7c7500e759ad
-
SHA256
f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0
-
SHA512
e773fe5653d3958a9f210afac136d4c4b461103755a037f6d4c3d2839b20629df10ac3075194048568cf5cd6779644eb369e1681cb308785e5fc2ca7154b23ae
-
SSDEEP
24576:gRMQr55gSMkXY56OkiP0UztwQtiyIakELQ40F0ePjoubJ0:vQV5gSMkoI7fWtlsL8Q4KU
Malware Config
Extracted
Family
risepro
C2
147.45.47.126:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
pid Process 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2084 f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe"C:\Users\Admin\AppData\Local\Temp\f93f3c98a74c5022b0b954057d822395bd644f8298adb6074a5bc3b1fd75ebf0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2084