Overview
overview
10Static
static
3Launcher.exe
windows7-x64
10Launcher.exe
windows10-2004-x64
10amdhip64.dll
windows7-x64
1amdhip64.dll
windows10-2004-x64
1concrt140.dll
windows7-x64
1concrt140.dll
windows10-2004-x64
1res_mods/1..._a.pyc
windows7-x64
3res_mods/1..._a.pyc
windows10-2004-x64
3vvmsvcp140.dll
windows7-x64
1vvmsvcp140.dll
windows10-2004-x64
1Analysis
-
max time kernel
303s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Launcher.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
amdhip64.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
amdhip64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
concrt140.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
concrt140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
vvmsvcp140.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
vvmsvcp140.dll
Resource
win10v2004-20240611-en
General
-
Target
Launcher.exe
-
Size
763.9MB
-
MD5
4bd4b45bd3794ed04f005e35fe26a1ae
-
SHA1
af6c84972f62c82e34452bc525e6e9853d674420
-
SHA256
20873ad9d1cec3cc30369b5efa593e53ba9cfbf1769fa919be59d6f6eea7fb1c
-
SHA512
6aa4a0b1bfab7a9f00c1c7a5da7cd2647abcc1891041ded060c2e1e27cefd5c77e1d8072f19879c38acb2eaa055c47635559ccde03f234c2a8bcbb4ae7a914a7
-
SSDEEP
196608:ViMcReCLHdwM5kVKqSVlMWXmam9uLepUltO7cF+d9e/nd:VhCHCokVKrzMWX7m6lkIF+did
Malware Config
Extracted
risepro
77.91.77.117:50500
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4900 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1236 Launcher.exe 1236 Launcher.exe 1236 Launcher.exe 1236 Launcher.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4900 NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3148,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:81⤵PID:660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:748
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RequestImport.txt1⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:4900