Analysis
-
max time kernel
1172s -
max time network
1183s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-10-2024 17:09
Behavioral task
behavioral1
Sample
Rise 6.1.31/Rise.jar
Resource
win11-20241023-en
Behavioral task
behavioral2
Sample
Rise 6.1.31/start.cmd
Resource
win11-20241007-en
General
-
Target
Rise 6.1.31/Rise.jar
-
Size
11.7MB
-
MD5
62e3fbd568560b6b3ceeeb7f15befcf3
-
SHA1
499c81be40a7a5a7cdde84d9989a20f19039e9f5
-
SHA256
905de877c30480cee378952ac08624c62740c6ba168187842e980639ab531d7c
-
SHA512
3ed369cf87b209ea690163093e53b863d417288391e7133459227c48acad54fce88344c6de0cef0321048a1e8c05cea9ebe8659074f2fe474a70989b5019829c
-
SSDEEP
196608:zwvzisgD2fRkviJg4S/+Cxjpk67A+Y5qxSbWihrQNhNpZJKkMoFn5ZXGIC0OlW:aZfRaGSm295f8lhuhzZ85wn54aOlW
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1729963763070.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 796 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 796 wrote to memory of 3544 796 java.exe 78 PID 796 wrote to memory of 3544 796 java.exe 78 PID 796 wrote to memory of 2132 796 java.exe 80 PID 796 wrote to memory of 2132 796 java.exe 80 PID 2132 wrote to memory of 2828 2132 cmd.exe 82 PID 2132 wrote to memory of 2828 2132 cmd.exe 82 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3544 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Rise 6.1.31\Rise.jar"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729963763070.tmp2⤵
- Views/modifies file attributes
PID:3544
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729963763070.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729963763070.tmp" /f3⤵
- Adds Run key to start application
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD597e61fb51e41abe8dc8dc233829ac69d
SHA1992d39f87462378530da696164d73e9d1431c018
SHA25661922a886aab058ea7e217fbd8e0d49918aecb2120e05f3a019b0e510b51bb9f
SHA512a5cafe7b41dac62a7e077e3c5743aecd9f4fe8b3165be68e81153a0a5fd03d9d5af1fd0d4c27bab55ec149405b38c11db5d3dc853cd0725850bdf6919b37f115
-
Filesize
11.7MB
MD562e3fbd568560b6b3ceeeb7f15befcf3
SHA1499c81be40a7a5a7cdde84d9989a20f19039e9f5
SHA256905de877c30480cee378952ac08624c62740c6ba168187842e980639ab531d7c
SHA5123ed369cf87b209ea690163093e53b863d417288391e7133459227c48acad54fce88344c6de0cef0321048a1e8c05cea9ebe8659074f2fe474a70989b5019829c