Overview
overview
6Static
static
3Rift-2.0/Bleak.dll
windows7-x64
1Rift-2.0/Bleak.dll
windows10-2004-x64
1Rift-2.0/M...ch.dll
windows7-x64
1Rift-2.0/M...ch.dll
windows10-2004-x64
1Rift-2.0/M...on.dll
windows7-x64
1Rift-2.0/M...on.dll
windows10-2004-x64
1Rift-2.0/M...ng.dll
windows7-x64
1Rift-2.0/M...ng.dll
windows10-2004-x64
1Rift-2.0/M...ll.dll
windows7-x64
1Rift-2.0/M...ll.dll
windows10-2004-x64
1Rift-2.0/M...ck.dll
windows7-x64
1Rift-2.0/M...ck.dll
windows10-2004-x64
1Rift-2.0/N...on.dll
windows7-x64
1Rift-2.0/N...on.dll
windows10-2004-x64
1Rift-2.0/N...on.dll
windows7-x64
1Rift-2.0/N...on.dll
windows10-2004-x64
1Rift-2.0/R...nd.exe
windows7-x64
1Rift-2.0/R...nd.exe
windows10-2004-x64
1Rift-2.0/Rift.exe
windows7-x64
1Rift-2.0/Rift.exe
windows10-2004-x64
1Rift-2.0/Rift.exe
windows7-x64
1Rift-2.0/Rift.exe
windows10-2004-x64
6Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
Rift-2.0/Bleak.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Rift-2.0/Bleak.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
Rift-2.0/Microsoft.AspNetCore.JsonPatch.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Rift-2.0/Microsoft.AspNetCore.JsonPatch.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
Rift-2.0/Microsoft.AspNetCore.Mvc.NewtonsoftJson.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Rift-2.0/Microsoft.AspNetCore.Mvc.NewtonsoftJson.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
Rift-2.0/Microsoft.MobileBlazorBindings.Hosting.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Rift-2.0/Microsoft.MobileBlazorBindings.Hosting.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Rift-2.0/Microsoft.WindowsAPICodePack.Shell.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Rift-2.0/Microsoft.WindowsAPICodePack.Shell.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
Rift-2.0/Microsoft.WindowsAPICodePack.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Rift-2.0/Microsoft.WindowsAPICodePack.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
Rift-2.0/Newtonsoft.Json.Bson.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Rift-2.0/Newtonsoft.Json.Bson.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
Rift-2.0/Newtonsoft.Json.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Rift-2.0/Newtonsoft.Json.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
Rift-2.0/Rift.Backend.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
Rift-2.0/Rift.Backend.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
Rift-2.0/Rift.exe
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
Rift-2.0/Rift.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
Rift-2.0/Rift.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
Rift-2.0/Rift.exe
Resource
win10v2004-20240704-en
General
-
Target
Rift-2.0/Rift.exe
-
Size
124KB
-
MD5
5a54a54c3eb3a9c69bd79b5f71531b12
-
SHA1
2ec824a382374ac6a7221e2ae451712ba715e090
-
SHA256
41bbc5bba54765314d63c3a3c5f99ba0d223a0260796a56ec5603758afbdb9e7
-
SHA512
10b0980a74d7d3184cfa86ae576373380bcd975109b6050ca91135e55f6ab68e7549735164f64aca4cbd60d013359a9df6a7073f636653a0845aae778580abc1
-
SSDEEP
3072:86DhOHYMjlkvuk/1AdNR6LWaoQctlPn2:8BKqf6LV8
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies registry class 2 IoCs
Processes:
svchost.exesvchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3642458265-1901903390-453309326-1000\{ADF631D1-D3C2-47FF-B14A-25C0348DEE6A} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3642458265-1901903390-453309326-1000\{1636737A-E306-4A81-B6D0-A30FA39D4A4A} svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2912 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rift-2.0\Rift.exe"C:\Users\Admin\AppData\Local\Temp\Rift-2.0\Rift.exe"1⤵PID:1444
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:3536
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:3728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c