Analysis

  • max time kernel
    291s
  • max time network
    245s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2025, 08:20

General

  • Target

    c7310cfa388018ff51a94a34972c449c19d8442c8f89f31cea82bf0da6896c0d.exe

  • Size

    2.3MB

  • MD5

    05481baa9cdc76875c2d60d3c10fa76f

  • SHA1

    31e7f46ea3654854a128ef18f2b67a3c8eb3dd7e

  • SHA256

    c7310cfa388018ff51a94a34972c449c19d8442c8f89f31cea82bf0da6896c0d

  • SHA512

    4e5bd97e42c59d60987d235b3fd3de0b789f2dd3a9ddfb5aeec3e49b6838851b9338f8de846045d03e70199fc46b395f6ed8830bf4324271c154e20aa163e6ec

  • SSDEEP

    49152:SfNYyhPNfMGphcnhnTUnPhWccCgj/csaTYEueEi+:cXW1UPhl0cM

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Risepro family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7310cfa388018ff51a94a34972c449c19d8442c8f89f31cea82bf0da6896c0d.exe
    "C:\Users\Admin\AppData\Local\Temp\c7310cfa388018ff51a94a34972c449c19d8442c8f89f31cea82bf0da6896c0d.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/572-0-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-1-0x00000000777B0000-0x00000000777B2000-memory.dmp

    Filesize

    8KB

  • memory/572-13-0x0000000000940000-0x0000000000941000-memory.dmp

    Filesize

    4KB

  • memory/572-12-0x00000000008F0000-0x00000000008F2000-memory.dmp

    Filesize

    8KB

  • memory/572-11-0x0000000002A20000-0x0000000002A21000-memory.dmp

    Filesize

    4KB

  • memory/572-10-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

    Filesize

    4KB

  • memory/572-9-0x0000000002B80000-0x0000000002B81000-memory.dmp

    Filesize

    4KB

  • memory/572-8-0x0000000002BE0000-0x0000000002BE1000-memory.dmp

    Filesize

    4KB

  • memory/572-7-0x0000000000E70000-0x0000000000E71000-memory.dmp

    Filesize

    4KB

  • memory/572-6-0x0000000002B50000-0x0000000002B51000-memory.dmp

    Filesize

    4KB

  • memory/572-5-0x0000000000F00000-0x0000000000F01000-memory.dmp

    Filesize

    4KB

  • memory/572-4-0x0000000002B60000-0x0000000002B61000-memory.dmp

    Filesize

    4KB

  • memory/572-3-0x00000000009F0000-0x00000000009F1000-memory.dmp

    Filesize

    4KB

  • memory/572-2-0x0000000000E60000-0x0000000000E61000-memory.dmp

    Filesize

    4KB

  • memory/572-14-0x0000000002F00000-0x0000000002F02000-memory.dmp

    Filesize

    8KB

  • memory/572-15-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-16-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-17-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-18-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-19-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-20-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-21-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-22-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-23-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-24-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-25-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-26-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-27-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-28-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-29-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-30-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-31-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-32-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-33-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-34-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-35-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-36-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-37-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-38-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-39-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-40-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-41-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-42-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-43-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB

  • memory/572-44-0x0000000001010000-0x0000000001604000-memory.dmp

    Filesize

    6.0MB