Analysis
-
max time kernel
28s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe
Resource
win7-20240705-en
windows7-x64
5 signatures
150 seconds
General
-
Target
fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe
-
Size
7.5MB
-
MD5
ed5b1701e46aa9b8915e2c407802ad8a
-
SHA1
a9a4fdf15431716b9ad56c38181f2e4d20d5e66b
-
SHA256
fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9
-
SHA512
4692c54c831fd600380131c3cb8f6a86543da19bd64f424082b0bc3c3f2286a85aad2a0235e8716b0a81ede2591d17f7c849421b90592a0c37003c0a25b8b0eb
-
SSDEEP
98304:88T8pL9gfNShiK0esxzePg+SeAhAgKbAYOSpkyxE+Hs2tc2oXlpSd0b:88T8pL9gfNSwK0eIhlKbAYHxE+1o+dQ
Malware Config
Extracted
Family
risepro
C2
77.91.77.180:50500
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1692 set thread context of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2680 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 29 PID 1692 wrote to memory of 2680 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 29 PID 1692 wrote to memory of 2680 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 29 PID 1692 wrote to memory of 2680 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 29 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30 PID 1692 wrote to memory of 2852 1692 fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe"C:\Users\Admin\AppData\Local\Temp\fad774edc5a3699e77ff65728d21606542b053da4b43ab0594339bde7eddf6e9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2852
-