Analysis
-
max time kernel
142s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 18:03
Static task
static1
Behavioral task
behavioral1
Sample
a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe
Resource
win10v2004-20240508-en
General
-
Target
a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe
-
Size
2.3MB
-
MD5
d98685657a7a28b347cd4240ce3e1ad6
-
SHA1
ce2c4ae80666f6b3952674d0a12e5493f4dd48b3
-
SHA256
a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3
-
SHA512
92713d50257db122e5932426874d0d193e9d1757788606d72013a6db888dbc5b3567f8b734dd869bf3e95a0fda4211f1137afa9e9db2859ecc0e18707b88ecd0
-
SSDEEP
49152:p2FX/1SrP2ltBKZr8Hch8YWEPdAlCOWNN4+TltqebA6j2JqYmKDuHAb:MFX/11j4ocDWkaxkJbA02J1mKDp
Malware Config
Extracted
risepro
77.91.77.66:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Wine a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3116 a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3116 a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe 3116 a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe"C:\Users\Admin\AppData\Local\Temp\a8608b904715a0b0d337c005061ae4ba50150255cbbcf28a25a0800de3ba72e3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3116