Analysis

  • max time kernel
    100s
  • max time network
    142s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    15-11-2024 22:43

General

  • Target

    E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe

  • Size

    1.4MB

  • MD5

    586e8a1303aa1a9d794805cef724d5e3

  • SHA1

    5fc2b1e53cbd130020ebc2404eb6d38f869cf680

  • SHA256

    e43436adb5e9a765e5d30ef2dc7bf1b57037cda02b66f3dcc83520aad5bf82f2

  • SHA512

    dbee6e66c7750032360b24dd6308835d74eea7c3c033e181f6b800a39cf50f0323df4ac9b62777476a6b0f0322a4285124338ce61bf6fc2e3bbe41bdcae84ed0

  • SSDEEP

    24576:ekE0ODVXcJ/lX3DlX7xTbv1qW00NU1JdGU+wq0Dmr+to8lpb:jkJcJB37Tbv1q10NcqHwhPtlp

Malware Config

Extracted

Family

risepro

C2

95.217.5.29

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Risepro family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe
    "C:\Users\Admin\AppData\Local\Temp\E43436ADB5E9A765E5D30EF2DC7BF1B57037CDA02B66F3DCC83520AAD5BF82F2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      2⤵
        PID:4432
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2040-950-0x0000000000400000-0x0000000000572000-memory.dmp

      Filesize

      1.4MB

    • memory/4672-37-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-942-0x0000000006240000-0x00000000062A6000-memory.dmp

      Filesize

      408KB

    • memory/4672-3-0x00000000746D0000-0x0000000074E81000-memory.dmp

      Filesize

      7.7MB

    • memory/4672-4-0x0000000005C20000-0x0000000005D60000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-5-0x0000000005D60000-0x0000000005EA0000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-6-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-17-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-51-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-69-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-67-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-65-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-63-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-61-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-59-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-39-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-55-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-53-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-49-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-47-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-45-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-43-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-41-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-57-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-2-0x0000000005980000-0x0000000005AC0000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-15-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-33-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-31-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-29-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-27-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-25-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-23-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-21-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-35-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-13-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-11-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-9-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-7-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-19-0x0000000005D60000-0x0000000005E9A000-memory.dmp

      Filesize

      1.2MB

    • memory/4672-938-0x00000000746D0000-0x0000000074E81000-memory.dmp

      Filesize

      7.7MB

    • memory/4672-939-0x0000000005FA0000-0x0000000006078000-memory.dmp

      Filesize

      864KB

    • memory/4672-940-0x0000000005F40000-0x0000000005F8C000-memory.dmp

      Filesize

      304KB

    • memory/4672-941-0x00000000061A0000-0x0000000006232000-memory.dmp

      Filesize

      584KB

    • memory/4672-0-0x00000000746DE000-0x00000000746DF000-memory.dmp

      Filesize

      4KB

    • memory/4672-943-0x0000000006A70000-0x0000000007016000-memory.dmp

      Filesize

      5.6MB

    • memory/4672-944-0x00000000746DE000-0x00000000746DF000-memory.dmp

      Filesize

      4KB

    • memory/4672-945-0x00000000746D0000-0x0000000074E81000-memory.dmp

      Filesize

      7.7MB

    • memory/4672-951-0x00000000746D0000-0x0000000074E81000-memory.dmp

      Filesize

      7.7MB

    • memory/4672-1-0x0000000000D70000-0x0000000000EDA000-memory.dmp

      Filesize

      1.4MB