Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 17:50
Behavioral task
behavioral1
Sample
Rise 6.1.31/Rise.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Rise 6.1.31/Rise.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Rise 6.1.31/start.cmd
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Rise 6.1.31/start.cmd
Resource
win10v2004-20241007-en
General
-
Target
Rise 6.1.31/Rise.jar
-
Size
11.7MB
-
MD5
62e3fbd568560b6b3ceeeb7f15befcf3
-
SHA1
499c81be40a7a5a7cdde84d9989a20f19039e9f5
-
SHA256
905de877c30480cee378952ac08624c62740c6ba168187842e980639ab531d7c
-
SHA512
3ed369cf87b209ea690163093e53b863d417288391e7133459227c48acad54fce88344c6de0cef0321048a1e8c05cea9ebe8659074f2fe474a70989b5019829c
-
SSDEEP
196608:zwvzisgD2fRkviJg4S/+Cxjpk67A+Y5qxSbWihrQNhNpZJKkMoFn5ZXGIC0OlW:aZfRaGSm295f8lhuhzZ85wn54aOlW
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1729965012505.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 632 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 632 wrote to memory of 1476 632 java.exe 90 PID 632 wrote to memory of 1476 632 java.exe 90 PID 632 wrote to memory of 3452 632 java.exe 92 PID 632 wrote to memory of 3452 632 java.exe 92 PID 3452 wrote to memory of 2972 3452 cmd.exe 94 PID 3452 wrote to memory of 2972 3452 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1476 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Rise 6.1.31\Rise.jar"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729965012505.tmp2⤵
- Views/modifies file attributes
PID:1476
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729965012505.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1729965012505.tmp" /f3⤵
- Adds Run key to start application
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.7MB
MD562e3fbd568560b6b3ceeeb7f15befcf3
SHA1499c81be40a7a5a7cdde84d9989a20f19039e9f5
SHA256905de877c30480cee378952ac08624c62740c6ba168187842e980639ab531d7c
SHA5123ed369cf87b209ea690163093e53b863d417288391e7133459227c48acad54fce88344c6de0cef0321048a1e8c05cea9ebe8659074f2fe474a70989b5019829c