Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 16:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
6.4MB
-
MD5
ef7fba013fbe8829b6a7037170693d19
-
SHA1
63f02a3437d0e572fb284f826f8cc6ce4996e5bc
-
SHA256
038147fba2c54767ec6034e9e7c6a9fdffe4d3388a36ae61de5043843c941c34
-
SHA512
9550b68e14dc2217e28efd19a67e5f0327eae7660d04d6c5c6adbb6742ba0b157e671830d3b0cc9bb3192ad75ef981be4f0c9d9242a938a370ad360a18eecc45
-
SSDEEP
196608:6SLpeEaPy4MSpBcb9piUx6lNO35RAcI1:60eEaPy4h09MUJ3vV
Malware Config
Extracted
Family
risepro
C2
77.91.77.180:50500
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2848 set thread context of 2648 2848 file.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2848 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2848 file.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2644 2848 file.exe 28 PID 2848 wrote to memory of 2644 2848 file.exe 28 PID 2848 wrote to memory of 2644 2848 file.exe 28 PID 2848 wrote to memory of 2644 2848 file.exe 28 PID 2848 wrote to memory of 2648 2848 file.exe 29 PID 2848 wrote to memory of 2648 2848 file.exe 29 PID 2848 wrote to memory of 2648 2848 file.exe 29 PID 2848 wrote to memory of 2648 2848 file.exe 29 PID 2848 wrote to memory of 2648 2848 file.exe 29 PID 2848 wrote to memory of 2648 2848 file.exe 29 PID 2848 wrote to memory of 2648 2848 file.exe 29 PID 2848 wrote to memory of 2648 2848 file.exe 29 PID 2848 wrote to memory of 2648 2848 file.exe 29 PID 2848 wrote to memory of 2648 2848 file.exe 29 PID 2848 wrote to memory of 2648 2848 file.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2648
-