Overview
overview
3Static
static
3Rise v6.1.25.zip
windows7-x64
1Rise v6.1.25.zip
windows10-2004-x64
1Rise 6.1.2...erties
windows7-x64
3Rise 6.1.2...erties
windows10-2004-x64
3Rise 6.1.2...vm.cfg
windows7-x64
3Rise 6.1.2...vm.cfg
windows10-2004-x64
3Rise 6.1.2...erties
windows7-x64
3Rise 6.1.2...erties
windows10-2004-x64
3Analysis
-
max time kernel
359s -
max time network
370s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
Rise v6.1.25.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Rise v6.1.25.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Rise 6.1.25 beta fix/files/azul-1.8.9_345/lib/accessibility.properties
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Rise 6.1.25 beta fix/files/azul-1.8.9_345/lib/accessibility.properties
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Rise 6.1.25 beta fix/files/azul-1.8.9_345/lib/amd64/jvm.cfg
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Rise 6.1.25 beta fix/files/azul-1.8.9_345/lib/amd64/jvm.cfg
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Rise 6.1.25 beta fix/files/azul-1.8.9_345/lib/calendars.properties
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Rise 6.1.25 beta fix/files/azul-1.8.9_345/lib/calendars.properties
Resource
win10v2004-20240709-en
General
-
Target
Rise 6.1.25 beta fix/files/azul-1.8.9_345/lib/accessibility.properties
-
Size
149B
-
MD5
2ed483df31645d3d00c625c00c1e5a14
-
SHA1
27c9b302d2d47aae04fc1f4ef9127a2835a77853
-
SHA256
68ef2f3c6d7636e39c6626ed1bd700e3a6b796c25a9e5feca4533abfacd61cdf
-
SHA512
4bf6d06f2ceaf070df4bd734370def74a6dd545fd40efd64a948e1422470ef39e37a4909feeb8f0731d5badb3dd9086e96dace6bdca7bbd3078e8383b16894da
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\properties_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\properties_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.properties\ = "properties_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\properties_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.properties rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\properties_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\properties_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\properties_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2876 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2876 AcroRd32.exe 2876 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2944 2156 cmd.exe 32 PID 2156 wrote to memory of 2944 2156 cmd.exe 32 PID 2156 wrote to memory of 2944 2156 cmd.exe 32 PID 2944 wrote to memory of 2876 2944 rundll32.exe 33 PID 2944 wrote to memory of 2876 2944 rundll32.exe 33 PID 2944 wrote to memory of 2876 2944 rundll32.exe 33 PID 2944 wrote to memory of 2876 2944 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Rise 6.1.25 beta fix\files\azul-1.8.9_345\lib\accessibility.properties"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Rise 6.1.25 beta fix\files\azul-1.8.9_345\lib\accessibility.properties2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Rise 6.1.25 beta fix\files\azul-1.8.9_345\lib\accessibility.properties"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5873bb89b7394f33fa5fb854b6c729cab
SHA1e5cccfc445ebf86da206537e349b42cb7411e6fd
SHA2561cbf925637f742018cba1e0940342cb2ffea9a5c27fcc1df4c55d2c06ab98b93
SHA512f4d3b478e4f51c27eabc46d57d8940f5944c5302aca6ef0d7f253edd846395bd935a8a15b9999c1f817c64cd3c97d84764c4d1215c6cbe8f9015b842795cc22f