Analysis
-
max time kernel
135s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 17:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240611-en
windows7-x64
4 signatures
150 seconds
General
-
Target
file.exe
-
Size
5.7MB
-
MD5
6f66a80f63f04a40812c6e410a26694b
-
SHA1
b2b28c03f8ab3fea28f21394175fccdeadab24a0
-
SHA256
3498a720830519dabf81f3f99afe873c06407efffe118f59ec88cba096c559cb
-
SHA512
eddf716ba6a2042833e6f30f9b16cb75d75bc8cd7e704fd42e375ada556aff598ed79c22f63b783d5f95885c6a82fbc570cc8aa55a6bb6b2aac27ccc67368c56
-
SSDEEP
98304:EtMGzMuHWLAySm4nS8+chDsnHhfGCjqPCUfs6uw4ah:EPo3LAJJnKLqKUfs6Kah
Malware Config
Extracted
Family
risepro
C2
77.91.77.180:50500
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3652 set thread context of 4760 3652 file.exe 83 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3652 file.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3652 wrote to memory of 4760 3652 file.exe 83 PID 3652 wrote to memory of 4760 3652 file.exe 83 PID 3652 wrote to memory of 4760 3652 file.exe 83 PID 3652 wrote to memory of 4760 3652 file.exe 83 PID 3652 wrote to memory of 4760 3652 file.exe 83 PID 3652 wrote to memory of 4760 3652 file.exe 83 PID 3652 wrote to memory of 4760 3652 file.exe 83 PID 3652 wrote to memory of 4760 3652 file.exe 83 PID 3652 wrote to memory of 4760 3652 file.exe 83 PID 3652 wrote to memory of 4760 3652 file.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:4760
-