Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 09:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
297270c13474cdcd006acc261c98050a.exe
Resource
win7-20240729-en
windows7-x64
0 signatures
150 seconds
General
-
Target
297270c13474cdcd006acc261c98050a.exe
-
Size
4.8MB
-
MD5
297270c13474cdcd006acc261c98050a
-
SHA1
40fd185b12939822e4cc02da09ae3d38aea83306
-
SHA256
ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b
-
SHA512
cb1a42bf6c34f3042809f29a6cb2e11f4699c4d1718e5da340fac205a6875145cae2a690736206d8c19ad68916efc5c835d3488a1aa272f0d0e00cddeb150d00
-
SSDEEP
49152:/s+CpclD5n5jx/cOOXjdyfpPaG02dj6cwH4n1Yzb5UBAyXjYeBhZ8jGdn7h:XxlDnZpPx024cw47
Malware Config
Extracted
Family
risepro
C2
193.233.132.67:5000
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
297270c13474cdcd006acc261c98050a.exedescription pid process target process PID 2440 set thread context of 4048 2440 297270c13474cdcd006acc261c98050a.exe ADelRCP.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ADelRCP.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ADelRCP.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
297270c13474cdcd006acc261c98050a.exedescription pid process target process PID 2440 wrote to memory of 4048 2440 297270c13474cdcd006acc261c98050a.exe ADelRCP.exe PID 2440 wrote to memory of 4048 2440 297270c13474cdcd006acc261c98050a.exe ADelRCP.exe PID 2440 wrote to memory of 4048 2440 297270c13474cdcd006acc261c98050a.exe ADelRCP.exe PID 2440 wrote to memory of 4048 2440 297270c13474cdcd006acc261c98050a.exe ADelRCP.exe PID 2440 wrote to memory of 4048 2440 297270c13474cdcd006acc261c98050a.exe ADelRCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\297270c13474cdcd006acc261c98050a.exe"C:\Users\Admin\AppData\Local\Temp\297270c13474cdcd006acc261c98050a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4048
-