Analysis

  • max time kernel
    139s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-10-2024 16:42

General

  • Target

    Rise 6.1.31/start.cmd

  • Size

    41B

  • MD5

    d81f3f20ef2eda780a107a9b50cc718b

  • SHA1

    6fe33901c94fe7005d27af5d4ce9de2bc9a3e908

  • SHA256

    d9cff4ea291d91d405dfb8ec36e2ce7f85bd0c00d37efa1da29f8ca5c872d0c9

  • SHA512

    1960a59230fb721045cdc232446c45f56ac60762be96e555db119184c1526b6af785d8a14a934f440bf12e385a94c8cb9d9b767271abf42444dd98ea8f8c98df

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Rise 6.1.31\start.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
      java -jar Rise.jar
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Windows\SYSTEM32\attrib.exe
        attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729960960353.tmp
        3⤵
        • Views/modifies file attributes
        PID:4420
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729960960353.tmp" /f"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Windows\system32\reg.exe
          REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729960960353.tmp" /f
          4⤵
          • Adds Run key to start application
          PID:4148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729960960353.tmp

    Filesize

    7.5MB

    MD5

    9187f658f00274786ee64db327c79a49

    SHA1

    3d6247d3fa318a17d27e07ccd1196b7bcc80bf4e

    SHA256

    4b94448f18a732d56cc170623b76551573756839963fe99df7776854e7752753

    SHA512

    7792dd1587f1f3aa1441044d1ac45427f73c4df5a88893fdf505250a4a08c4b4d79b544c495f5cf60cbe67febbeaf2ad540795ec300d52e2be2510b3ceb9dd1f

  • memory/5040-62-0x000002A184AD0000-0x000002A184AE0000-memory.dmp

    Filesize

    64KB

  • memory/5040-95-0x000002A184B10000-0x000002A184B20000-memory.dmp

    Filesize

    64KB

  • memory/5040-18-0x000002A184A00000-0x000002A184A10000-memory.dmp

    Filesize

    64KB

  • memory/5040-61-0x000002A184A30000-0x000002A184A40000-memory.dmp

    Filesize

    64KB

  • memory/5040-21-0x000002A184A10000-0x000002A184A20000-memory.dmp

    Filesize

    64KB

  • memory/5040-24-0x000002A184A30000-0x000002A184A40000-memory.dmp

    Filesize

    64KB

  • memory/5040-26-0x000002A184A40000-0x000002A184A50000-memory.dmp

    Filesize

    64KB

  • memory/5040-28-0x000002A184A50000-0x000002A184A60000-memory.dmp

    Filesize

    64KB

  • memory/5040-30-0x000002A184A60000-0x000002A184A70000-memory.dmp

    Filesize

    64KB

  • memory/5040-14-0x000002A184760000-0x000002A184761000-memory.dmp

    Filesize

    4KB

  • memory/5040-38-0x000002A184A80000-0x000002A184A90000-memory.dmp

    Filesize

    64KB

  • memory/5040-37-0x000002A184A70000-0x000002A184A80000-memory.dmp

    Filesize

    64KB

  • memory/5040-36-0x000002A184780000-0x000002A1849F0000-memory.dmp

    Filesize

    2.4MB

  • memory/5040-43-0x000002A184A90000-0x000002A184AA0000-memory.dmp

    Filesize

    64KB

  • memory/5040-42-0x000002A184A00000-0x000002A184A10000-memory.dmp

    Filesize

    64KB

  • memory/5040-41-0x000002A1849F0000-0x000002A184A00000-memory.dmp

    Filesize

    64KB

  • memory/5040-47-0x000002A184AA0000-0x000002A184AB0000-memory.dmp

    Filesize

    64KB

  • memory/5040-64-0x000002A184A40000-0x000002A184A50000-memory.dmp

    Filesize

    64KB

  • memory/5040-53-0x000002A184A20000-0x000002A184A30000-memory.dmp

    Filesize

    64KB

  • memory/5040-52-0x000002A184A10000-0x000002A184A20000-memory.dmp

    Filesize

    64KB

  • memory/5040-57-0x000002A184AC0000-0x000002A184AD0000-memory.dmp

    Filesize

    64KB

  • memory/5040-2-0x000002A184780000-0x000002A1849F0000-memory.dmp

    Filesize

    2.4MB

  • memory/5040-22-0x000002A184A20000-0x000002A184A30000-memory.dmp

    Filesize

    64KB

  • memory/5040-17-0x000002A1849F0000-0x000002A184A00000-memory.dmp

    Filesize

    64KB

  • memory/5040-54-0x000002A184AB0000-0x000002A184AC0000-memory.dmp

    Filesize

    64KB

  • memory/5040-66-0x000002A184760000-0x000002A184761000-memory.dmp

    Filesize

    4KB

  • memory/5040-67-0x000002A184A50000-0x000002A184A60000-memory.dmp

    Filesize

    64KB

  • memory/5040-70-0x000002A184A60000-0x000002A184A70000-memory.dmp

    Filesize

    64KB

  • memory/5040-71-0x000002A184A70000-0x000002A184A80000-memory.dmp

    Filesize

    64KB

  • memory/5040-72-0x000002A184A80000-0x000002A184A90000-memory.dmp

    Filesize

    64KB

  • memory/5040-73-0x000002A184A90000-0x000002A184AA0000-memory.dmp

    Filesize

    64KB

  • memory/5040-74-0x000002A184AF0000-0x000002A184B00000-memory.dmp

    Filesize

    64KB

  • memory/5040-75-0x000002A184AA0000-0x000002A184AB0000-memory.dmp

    Filesize

    64KB

  • memory/5040-76-0x000002A184AB0000-0x000002A184AC0000-memory.dmp

    Filesize

    64KB

  • memory/5040-77-0x000002A184AC0000-0x000002A184AD0000-memory.dmp

    Filesize

    64KB

  • memory/5040-78-0x000002A184AD0000-0x000002A184AE0000-memory.dmp

    Filesize

    64KB

  • memory/5040-79-0x000002A184AE0000-0x000002A184AF0000-memory.dmp

    Filesize

    64KB

  • memory/5040-80-0x000002A184AF0000-0x000002A184B00000-memory.dmp

    Filesize

    64KB

  • memory/5040-83-0x000002A184B00000-0x000002A184B10000-memory.dmp

    Filesize

    64KB

  • memory/5040-84-0x000002A184B00000-0x000002A184B10000-memory.dmp

    Filesize

    64KB

  • memory/5040-89-0x000002A184B10000-0x000002A184B20000-memory.dmp

    Filesize

    64KB

  • memory/5040-93-0x000002A184B30000-0x000002A184B40000-memory.dmp

    Filesize

    64KB

  • memory/5040-92-0x000002A184B20000-0x000002A184B30000-memory.dmp

    Filesize

    64KB

  • memory/5040-65-0x000002A184AE0000-0x000002A184AF0000-memory.dmp

    Filesize

    64KB

  • memory/5040-96-0x000002A184B30000-0x000002A184B40000-memory.dmp

    Filesize

    64KB