Analysis
-
max time kernel
100s -
max time network
142s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
15-11-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe
Resource
win10v2004-20241007-en
General
-
Target
E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe
-
Size
1.4MB
-
MD5
586e8a1303aa1a9d794805cef724d5e3
-
SHA1
5fc2b1e53cbd130020ebc2404eb6d38f869cf680
-
SHA256
e43436adb5e9a765e5d30ef2dc7bf1b57037cda02b66f3dcc83520aad5bf82f2
-
SHA512
dbee6e66c7750032360b24dd6308835d74eea7c3c033e181f6b800a39cf50f0323df4ac9b62777476a6b0f0322a4285124338ce61bf6fc2e3bbe41bdcae84ed0
-
SSDEEP
24576:ekE0ODVXcJ/lX3DlX7xTbv1qW00NU1JdGU+wq0Dmr+to8lpb:jkJcJB37Tbv1q10NcqHwhPtlp
Malware Config
Extracted
risepro
95.217.5.29
Signatures
-
Risepro family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4672 set thread context of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4432 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 91 PID 4672 wrote to memory of 4432 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 91 PID 4672 wrote to memory of 4432 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 91 PID 4672 wrote to memory of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92 PID 4672 wrote to memory of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92 PID 4672 wrote to memory of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92 PID 4672 wrote to memory of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92 PID 4672 wrote to memory of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92 PID 4672 wrote to memory of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92 PID 4672 wrote to memory of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92 PID 4672 wrote to memory of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92 PID 4672 wrote to memory of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92 PID 4672 wrote to memory of 2040 4672 E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe"C:\Users\Admin\AppData\Local\Temp\E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵PID:4432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵
- System Location Discovery: System Language Discovery
PID:2040
-