Overview
overview
10Static
static
3Win32.Rise...er.exe
windows10-1703-x64
10Win32.Rise...xy.exe
windows10-1703-x64
8Win32.Rise...up.exe
windows10-1703-x64
7Win32.Rise...64.exe
windows10-1703-x64
7Win32.Rise...86.exe
windows10-1703-x64
7Win32.Rise...Q.docx
windows10-1703-x64
1Win32.Rise...Q.docx
windows10-1703-x64
1Analysis
-
max time kernel
131s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-06-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
Win32.RisePro.b/Panel/RisePro_Server.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Win32.RisePro.b/Proxy/RisePro_Proxy.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Win32.RisePro.b/Tools/ChromeSetup.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Win32.RisePro.b/Tools/VC_redist.x64.exe
Resource
win10-20240611-en
Behavioral task
behavioral5
Sample
Win32.RisePro.b/Tools/VC_redist.x86.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Win32.RisePro.b/[ENG] FAQ.docx
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
Win32.RisePro.b/[RUS] FAQ.docx
Resource
win10-20240404-en
General
-
Target
Win32.RisePro.b/Proxy/RisePro_Proxy.exe
-
Size
568KB
-
MD5
fe8d041d2fbdedd9627f1a55976bdc61
-
SHA1
fe88fc39efb0e2b29bfc2730bf8a4bf3e71657f2
-
SHA256
af26b57034cbd6ee66cedba4abe6d247da5ae5e6beb74314ebdc80f1d1299f7c
-
SHA512
8df251518c17434b04895589d5c78780f6ca7a97d10730a4240d1fc82bc64ad1869288c7dd395d29fd0159ad082d7dcf98198d17a573c79e4880d7a7f7cdfa9a
-
SSDEEP
12288:aSxtHZFviRZe7Zg5KlPvNvw4iVfUxpDGzwIolidy/j:fxrFviRZe7Zg5KlPvNvMV8x+voliu
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 4336 netsh.exe 1800 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
RisePro_Proxy.execmd.execmd.exedescription pid Process procid_target PID 4868 wrote to memory of 2924 4868 RisePro_Proxy.exe 74 PID 4868 wrote to memory of 2924 4868 RisePro_Proxy.exe 74 PID 4868 wrote to memory of 2924 4868 RisePro_Proxy.exe 74 PID 4868 wrote to memory of 2204 4868 RisePro_Proxy.exe 75 PID 4868 wrote to memory of 2204 4868 RisePro_Proxy.exe 75 PID 4868 wrote to memory of 2204 4868 RisePro_Proxy.exe 75 PID 2204 wrote to memory of 4336 2204 cmd.exe 76 PID 2204 wrote to memory of 4336 2204 cmd.exe 76 PID 2204 wrote to memory of 4336 2204 cmd.exe 76 PID 4868 wrote to memory of 2700 4868 RisePro_Proxy.exe 77 PID 4868 wrote to memory of 2700 4868 RisePro_Proxy.exe 77 PID 4868 wrote to memory of 2700 4868 RisePro_Proxy.exe 77 PID 2700 wrote to memory of 1800 2700 cmd.exe 78 PID 2700 wrote to memory of 1800 2700 cmd.exe 78 PID 2700 wrote to memory of 1800 2700 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\Win32.RisePro.b\Proxy\RisePro_Proxy.exe"C:\Users\Admin\AppData\Local\Temp\Win32.RisePro.b\Proxy\RisePro_Proxy.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall show rule name="RisePro External - 50500" > nul2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall show rule name="RisePro External - 50500"3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="RisePro External - 50500" dir=in action=allow protocol=TCP localport=505002⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="RisePro External - 50500" dir=in action=allow protocol=TCP localport=505003⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1800
-
-