Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 04:48

General

  • Target

    9e2a3d673b97bbb4b879907a6de4217907800192401dc404af51953e59765838.exe

  • Size

    3.4MB

  • MD5

    910182267ab297ced9fa6cac86f93c3e

  • SHA1

    ba9d0f067c51fa7ab9e2c3af128d4e3a9f2c28b9

  • SHA256

    9e2a3d673b97bbb4b879907a6de4217907800192401dc404af51953e59765838

  • SHA512

    92c313640fddf3ddf0dd6491de8182597df5848240f8791543459240bcf2ceeb8f76e98add171831aaa9fea1001625bbc68f7c5a2f6aebb232f536c1acca0d2a

  • SSDEEP

    49152:J1UHC6vWZtnxJB9qBBmAAcuXshmk2sP4gNi1KEj39tpz7vDZvtNUZRMYDiTYwEqe:J1+WZtzDqBScuXKmk2RXKi17NteXW6S0

Malware Config

Extracted

Family

risepro

C2

5.42.65.117:50500

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e2a3d673b97bbb4b879907a6de4217907800192401dc404af51953e59765838.exe
    "C:\Users\Admin\AppData\Local\Temp\9e2a3d673b97bbb4b879907a6de4217907800192401dc404af51953e59765838.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3952-0-0x0000000000BE0000-0x00000000015E4000-memory.dmp

    Filesize

    10.0MB

  • memory/3952-1-0x0000000075220000-0x0000000075221000-memory.dmp

    Filesize

    4KB

  • memory/3952-3-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-2-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-4-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-5-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-7-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-6-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-8-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-10-0x0000000000BE0000-0x00000000015E4000-memory.dmp

    Filesize

    10.0MB

  • memory/3952-11-0x0000000000BE0000-0x00000000015E4000-memory.dmp

    Filesize

    10.0MB

  • memory/3952-12-0x0000000000BE0000-0x00000000015E4000-memory.dmp

    Filesize

    10.0MB

  • memory/3952-9-0x0000000000BE0000-0x00000000015E4000-memory.dmp

    Filesize

    10.0MB

  • memory/3952-13-0x0000000000BE0000-0x00000000015E4000-memory.dmp

    Filesize

    10.0MB

  • memory/3952-14-0x0000000000BE0000-0x00000000015E4000-memory.dmp

    Filesize

    10.0MB

  • memory/3952-16-0x0000000000BE0000-0x00000000015E4000-memory.dmp

    Filesize

    10.0MB

  • memory/3952-15-0x0000000000BE0000-0x00000000015E4000-memory.dmp

    Filesize

    10.0MB

  • memory/3952-17-0x0000000000BE0000-0x00000000015E4000-memory.dmp

    Filesize

    10.0MB

  • memory/3952-22-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-21-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-20-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-19-0x0000000075220000-0x0000000075221000-memory.dmp

    Filesize

    4KB

  • memory/3952-23-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-24-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-25-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB

  • memory/3952-26-0x0000000075200000-0x00000000752F0000-memory.dmp

    Filesize

    960KB