Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/06/2024, 10:46 UTC

General

  • Target

    4aca1be03112e87584d9ac9ae0f8279ba272ff5c0daa12f409b2dc00b3c521ad.exe

  • Size

    3.2MB

  • MD5

    85ced2db3844ef1f2845ecdcc5d7abd7

  • SHA1

    e8d6caa8dea7ea66461be21d57216e623fe1ab88

  • SHA256

    4aca1be03112e87584d9ac9ae0f8279ba272ff5c0daa12f409b2dc00b3c521ad

  • SHA512

    f3ab409e3cd62fe00a5252c6feaad504fcd2a4f1bbbb57946bf811e0c5a66442942302ee69f58f5ae2170aed7d0c26eff553fa0f342ea76783edb3df7a720662

  • SSDEEP

    98304:iogtbKcIJSMG/4U7Qc6dVktuSreHWm8K8U:1gNKn8MG/4U94mtuSrsl8U

Malware Config

Extracted

Family

risepro

C2

77.91.77.66:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4aca1be03112e87584d9ac9ae0f8279ba272ff5c0daa12f409b2dc00b3c521ad.exe
    "C:\Users\Admin\AppData\Local\Temp\4aca1be03112e87584d9ac9ae0f8279ba272ff5c0daa12f409b2dc00b3c521ad.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    PID:1244

Network

  • flag-us
    DNS
    22.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.236.111.52.in-addr.arpa
    IN PTR
    Response
  • 52.111.243.30:443
    322 B
    7
  • 8.8.8.8:53
    22.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.236.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1244-0-0x0000000000400000-0x0000000000BFD000-memory.dmp

    Filesize

    8.0MB

  • memory/1244-2-0x0000000000400000-0x0000000000BFD000-memory.dmp

    Filesize

    8.0MB

  • memory/1244-3-0x0000000000400000-0x0000000000BFD000-memory.dmp

    Filesize

    8.0MB

  • memory/1244-1-0x0000000000400000-0x0000000000BFD000-memory.dmp

    Filesize

    8.0MB

  • memory/1244-4-0x0000000000400000-0x0000000000BFD000-memory.dmp

    Filesize

    8.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.