Behavioral task
behavioral1
Sample
1488-0-0x0000000000C90000-0x0000000001392000-memory.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1488-0-0x0000000000C90000-0x0000000001392000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
1488-0-0x0000000000C90000-0x0000000001392000-memory.dmp
-
Size
7.0MB
-
MD5
30d1242d273dcf2fa6cf0b1a7bed831e
-
SHA1
1cba2c275f6b336fbb6c9988bc156805bfdcc412
-
SHA256
7bc0825f1d9eff8e89aa6315cef240e197549bd11be6bbe4883a2fe7df98b9ad
-
SHA512
971da07f5960f7974b4e2bcfeca2d8ca1f0dafcad4a14017d7d38a04435120b80c4ad3b623bf242f54831b4f0c5c21e6e63146917414ffe6039c231070453ca0
-
SSDEEP
98304:fog9F35ToRxN11sQLMGWG34SE+vhczV02M+8o+ILLSyJoEajLLFc8:Qo35kRz1eQLBWoEJVaDdvxc8
Malware Config
Extracted
risepro
5.42.65.116:50500
Signatures
-
Risepro family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1488-0-0x0000000000C90000-0x0000000001392000-memory.dmp
Files
-
1488-0-0x0000000000C90000-0x0000000001392000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmpé� Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmpé� Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmpé� Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ