Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b.exe
Resource
win7-20240729-en
General
-
Target
ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b.exe
-
Size
4.8MB
-
MD5
297270c13474cdcd006acc261c98050a
-
SHA1
40fd185b12939822e4cc02da09ae3d38aea83306
-
SHA256
ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b
-
SHA512
cb1a42bf6c34f3042809f29a6cb2e11f4699c4d1718e5da340fac205a6875145cae2a690736206d8c19ad68916efc5c835d3488a1aa272f0d0e00cddeb150d00
-
SSDEEP
49152:/s+CpclD5n5jx/cOOXjdyfpPaG02dj6cwH4n1Yzb5UBAyXjYeBhZ8jGdn7h:XxlDnZpPx024cw47
Malware Config
Extracted
risepro
193.233.132.67:5000
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5084 set thread context of 3544 5084 ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ADelRCP.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3544 5084 ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b.exe 87 PID 5084 wrote to memory of 3544 5084 ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b.exe 87 PID 5084 wrote to memory of 3544 5084 ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b.exe 87 PID 5084 wrote to memory of 3544 5084 ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b.exe 87 PID 5084 wrote to memory of 3544 5084 ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b.exe"C:\Users\Admin\AppData\Local\Temp\ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3544
-