Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 14:18
Behavioral task
behavioral1
Sample
57ebb357d0760839b7de05f1950bc02738328ef70ea770689b34dc161c2fe4a3.exe
Resource
win10v2004-20240611-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
57ebb357d0760839b7de05f1950bc02738328ef70ea770689b34dc161c2fe4a3.exe
-
Size
3.4MB
-
MD5
45a76fb9be4b4778e5880d2a8e41e197
-
SHA1
50053b17a0a255f9c17c6e51a19aaf6f6dd93584
-
SHA256
57ebb357d0760839b7de05f1950bc02738328ef70ea770689b34dc161c2fe4a3
-
SHA512
085965e8c6d5dea6002e8baad8a959c2ca4385a3db4709e575301283164315020bb6aa694bbcadc1297b61d63c3abf6f909f17f811a6190fa8ddcc5de8f59bcf
-
SSDEEP
98304:Pm6JSwzBrMyM0bS1pw0ixx1MLyTseQncDUzP:Pm6J9BOfw0fyAc4P
Malware Config
Extracted
Family
risepro
C2
77.91.77.66:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 57ebb357d0760839b7de05f1950bc02738328ef70ea770689b34dc161c2fe4a3.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 57ebb357d0760839b7de05f1950bc02738328ef70ea770689b34dc161c2fe4a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 57ebb357d0760839b7de05f1950bc02738328ef70ea770689b34dc161c2fe4a3.exe -
resource yara_rule behavioral1/memory/708-0-0x0000000000400000-0x0000000000C58000-memory.dmp themida behavioral1/memory/708-2-0x0000000000400000-0x0000000000C58000-memory.dmp themida behavioral1/memory/708-3-0x0000000000400000-0x0000000000C58000-memory.dmp themida behavioral1/memory/708-1-0x0000000000400000-0x0000000000C58000-memory.dmp themida behavioral1/memory/708-4-0x0000000000400000-0x0000000000C58000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 57ebb357d0760839b7de05f1950bc02738328ef70ea770689b34dc161c2fe4a3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57ebb357d0760839b7de05f1950bc02738328ef70ea770689b34dc161c2fe4a3.exe"C:\Users\Admin\AppData\Local\Temp\57ebb357d0760839b7de05f1950bc02738328ef70ea770689b34dc161c2fe4a3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:708