Analysis
-
max time kernel
436s -
max time network
438s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-10-2024 16:32
Behavioral task
behavioral1
Sample
Rise.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Rise.zip
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Rise 6.1.31/Rise.jar
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
Rise 6.1.31/Rise.jar
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Rise 6.1.31/start.cmd
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
Rise 6.1.31/start.cmd
Resource
win11-20241007-en
General
-
Target
Rise 6.1.31/start.cmd
-
Size
41B
-
MD5
d81f3f20ef2eda780a107a9b50cc718b
-
SHA1
6fe33901c94fe7005d27af5d4ce9de2bc9a3e908
-
SHA256
d9cff4ea291d91d405dfb8ec36e2ce7f85bd0c00d37efa1da29f8ca5c872d0c9
-
SHA512
1960a59230fb721045cdc232446c45f56ac60762be96e555db119184c1526b6af785d8a14a934f440bf12e385a94c8cb9d9b767271abf42444dd98ea8f8c98df
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1729960674061.tmp" reg.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: java.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3216 java.exe 3216 java.exe 3216 java.exe 3216 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4388 wrote to memory of 3216 4388 cmd.exe 82 PID 4388 wrote to memory of 3216 4388 cmd.exe 82 PID 3216 wrote to memory of 3176 3216 java.exe 83 PID 3216 wrote to memory of 3176 3216 java.exe 83 PID 3216 wrote to memory of 2072 3216 java.exe 85 PID 3216 wrote to memory of 2072 3216 java.exe 85 PID 2072 wrote to memory of 2592 2072 cmd.exe 87 PID 2072 wrote to memory of 2592 2072 cmd.exe 87 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3176 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Rise 6.1.31\start.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar Rise.jar2⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729960674061.tmp3⤵
- Views/modifies file attributes
PID:3176
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729960674061.tmp" /f"3⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729960674061.tmp" /f4⤵
- Adds Run key to start application
PID:2592
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484B
MD5cc8fbb4440ae04418928c8d42e4ccb21
SHA1bbbeed8e96bcfa4dfd977441a83566dbc638e079
SHA256cd899a1183aeeac6a4c6a0f17d8af1845d244896d7e9fd309b1f486d918f89c0
SHA512569892d513c1c56ceac24ee757e4868a14b4c3a5084c2b21192a36a171dd5240914621a203ebacb0ada0d65fc406c31be8346445fb3a86c0280515006376472c
-
Filesize
32KB
MD536c71e3317bcdeb8a4c756c089159696
SHA10cb9b3c14acc0667b257b103def2c921b33710b2
SHA25611408db565b824abd1250958c9ea895f0a6cd040b8827f907baaa4ef2d0304e9
SHA512951be17bb1c07c1ab5da2b2cfec7b0ef7a95bf9738468ec1431580f0650bba999921db2eb5761fc5aae52d5cc65db7ac2b8ab406dc76b6f9ef87f277c7760c2f
-
Filesize
35KB
MD5a8bcacc658d25f913ce6ca28718d3461
SHA1967c8289a2244064bed3ce11478ad500750cf086
SHA256e57b868efe241fc47d38e91c940856b563df0c54e5eb2c51547b83bce5df8172
SHA512d5d35bb1561e2d85a0ae1850c03ab5115ed7be2f06ffe9c6d164036eb01776076f7ca155be29f41639c290ed866ec852eff7494d488a152a2d7da1086ae6f353
-
Filesize
30KB
MD56b71dca1542b1e7ed7f28465b0823627
SHA14c661ac69c5a57656aa79715abc056149bc5fb9e
SHA256061a84821c8ac150f3698f62af8d2d0b84d552ece5ae1619b45f01b63831fc40
SHA51264fa491b6de3a37806a490c3b4b64892be8ca762c6e046af7b13a7f12bcba6452486655144cd0cdca2efe52ff4a22775a811959127aedfe6890f9f29b019e1d9
-
Filesize
395B
MD53338aa57aaaded7c314425d22be5483e
SHA1b09b6bc78079488dba2112e92a5ca59388f0d382
SHA2566ec54458e0593bd19cb9437e7c778d913c8cdf942bb0396e34866fae1aa96767
SHA512d3c3c6c1a4ea7bd6c68c502bc2c720ae79d54f31062a55aac280d05e4ce27224a42e092fc3b9d0639e575722825b071e7d52b1a284fc20a0d4a30dbbb5bbf3f2