File name: | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe |
Full analysis: | https://app.any.run/tasks/4caa08ab-d95f-41d3-a416-c0b5db250a96 |
Verdict: | Malicious activity |
Threats: | RisePro, an information-stealing malware, targets a wide range of sensitive data, including credit cards, passwords, and cryptocurrency wallets. By compromising infected devices, RisePro can steal valuable information and potentially cause significant financial and personal losses for victims. |
Analysis date: | June 20, 2024, 22:12:24 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | AD7B4598918C9F75BCAD2D3837ABC47E |
SHA1: | C216E887A2559BC45F4B75D8F97E8D2450F16213 |
SHA256: | D0E3C511F4C02B9DD4130462AC716024AD29581A072A9095F40AC7C348C7EDE6 |
SSDEEP: | 98304:B8wUv5cf4T8MdOW3yw+jZITl9FlsIe7pZGiqRJmfcG/aN0PdB+WOZqsyoHRgzOip:FTPL |
.exe | | | Win64 Executable (generic) (76.4) |
---|---|---|
.exe | | | Win32 Executable (generic) (12.4) |
.exe | | | Generic Win/DOS Executable (5.5) |
.exe | | | DOS Executable Generic (5.5) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2024:05:21 09:27:48+00:00 |
ImageFileCharacteristics: | Executable, 32-bit |
PEType: | PE32 |
LinkerVersion: | 14.39 |
CodeSize: | 1424384 |
InitializedDataSize: | 228352 |
UninitializedDataSize: | - |
EntryPoint: | 0x5b2058 |
OSVersion: | 6 |
ImageVersion: | - |
SubsystemVersion: | 6 |
Subsystem: | Windows GUI |
FileVersionNumber: | 8.0.424.16909 |
ProductVersionNumber: | 8.0.424.16909 |
FileFlagsMask: | 0x003f |
FileFlags: | Special build |
FileOS: | Windows NT |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | English (U.S.) |
CharacterSet: | Unicode |
CompanyName: | Microsoft Corporation |
FileDescription: | .NET Host |
FileVersion: | 8.0.424.16909 |
InternalName: | dotnet.exe |
LegalCopyright: | Microsoft Corporation. All rights reserved. |
OriginalFileName: | dotnet.exe |
ProductName: | dotnet.exe |
ProductVersion: | 8.0.424.16909 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3412 | schtasks /create /f /RU "admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST | C:\Windows\System32\schtasks.exe | — | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3416 | "C:\Users\admin\AppData\Local\Temp\d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe" | C:\Users\admin\AppData\Local\Temp\d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Host Version: 8.0.424.16909 Modules
RisePro(PID) Process(3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe C2 (1)77.91.77.66:58709 Strings (55)\Battle.net \config \Local Storage \Skype \LunarClient S,{w_6 \Games UaEt, J~|Hw \FeatherClient \accounts.json \OpenVPN Connect \.feather\accounts.json \save.dat VaultCloseVault C:\program files (x86)\steam \databases \TLauncher \GHISLER\wcx_ftp.ini \Growtopia\save.dat \TotalCommander \Element\Local Storage \launcher_msa_credentials.bin \Microsoft\Skype for Desktop\Local Storage VaultOpenVault \.minecraft\launcher_accounts.json \Element \accounts.xml \wcx_ftp.ini frug?0 \accounts.txt \ey_tokens.txt \.purple WSASend logins \.lunarclient\settings\games\accounts.txt \launcher_profiles.json \Pidgin \Minecraft \OpenVPN Connect\profiles \Steam \Messengers \FileZilla C:\program files\steam APPDATA \.minecraft\launcher_msa_credentials.bin \Signal \Session Storage \ICQ\0001 \.minecraft\launcher_profiles.json \tlauncher_profiles.json \config.json VaultGetItem \Growtopia \launcher_accounts.json | |||||||||||||||
3432 | schtasks /create /f /RU "admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST | C:\Windows\System32\schtasks.exe | — | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | RageMP131 |
Value: C:\Users\admin\AppData\Local\RageMP131\RageMP131.exe | |||
(PID) Process: | (3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
(PID) Process: | (3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | delete value | Name: | ProxyServer |
Value: | |||
(PID) Process: | (3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | delete value | Name: | ProxyOverride |
Value: | |||
(PID) Process: | (3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | delete value | Name: | AutoConfigURL |
Value: | |||
(PID) Process: | (3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | delete value | Name: | AutoDetect |
Value: | |||
(PID) Process: | (3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
Operation: | write | Name: | SavedLegacySettings |
Value: 460000005D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
(PID) Process: | (3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (3416) d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | C:\Users\admin\AppData\Local\Temp\span2rzYkJHektdk\KvHrxJ77cmUgplaces.sqlite | — | |
MD5:— | SHA256:— | |||
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | C:\Users\admin\AppData\Local\Temp\span2rzYkJHektdk\UPG2LoPXwc7Oplaces.sqlite | — | |
MD5:— | SHA256:— | |||
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | C:\ProgramData\MPGPH131\MPGPH131.exe | executable | |
MD5:AD7B4598918C9F75BCAD2D3837ABC47E | SHA256:D0E3C511F4C02B9DD4130462AC716024AD29581A072A9095F40AC7C348C7EDE6 | |||
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | C:\Users\admin\AppData\Local\Temp\span2rzYkJHektdk\Ei8DrAmaYu9Kkey4.db | sqlite | |
MD5:F62D8E993EA9C3B3A89DA19E4012638D | SHA256:0971230A77EE2C3531E8B97E14954692713D5F7C8684788F4A823BBC05AD377A | |||
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | C:\Users\admin\AppData\Local\Temp\span2rzYkJHektdk\D87fZN3R3jFekey4.db | sqlite | |
MD5:F62D8E993EA9C3B3A89DA19E4012638D | SHA256:0971230A77EE2C3531E8B97E14954692713D5F7C8684788F4A823BBC05AD377A | |||
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | C:\Users\admin\AppData\Local\Temp\span2rzYkJHektdk\8ghN89CsjOW1key4.db | binary | |
MD5:F62D8E993EA9C3B3A89DA19E4012638D | SHA256:0971230A77EE2C3531E8B97E14954692713D5F7C8684788F4A823BBC05AD377A | |||
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | C:\Users\admin\AppData\Local\Temp\rage131MP.tmp | text | |
MD5:0DF39861E41C9CE6B37F2812B267F491 | SHA256:879F3AE8414698F676773126E1814681736EB751E78A503CD62A99C67FED6840 | |||
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | C:\Users\admin\AppData\Local\Temp\span2rzYkJHektdk\8v_dpGor87cVLogin Data | binary | |
MD5:52E51471E9281235323F633CD0DEA56C | SHA256:147F3137B387FE4FBE3215B7864568404580A799D031009FE9C718F4C2EF87D0 | |||
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | C:\Users\admin\AppData\Local\Temp\span2rzYkJHektdk\3b6N2Xdh3CYwkey4.db | sqlite | |
MD5:F62D8E993EA9C3B3A89DA19E4012638D | SHA256:0971230A77EE2C3531E8B97E14954692713D5F7C8684788F4A823BBC05AD377A | |||
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | C:\Users\admin\AppData\Local\Temp\span2rzYkJHektdk\oOPEmFmu_xsJcert9.db | sqlite | |
MD5:ABD01A62C4D5F31D0B0A9474DEB33DD1 | SHA256:77EC9DE5C309DC06D88FFA2D38148DA637637B145EC35CFE2EDBDC3148D56128 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1372 | svchost.exe | GET | 304 | 23.1.254.200:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33 | unknown | — | — | unknown |
1372 | svchost.exe | GET | 200 | 23.36.76.91:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
1372 | svchost.exe | GET | 200 | 184.25.0.231:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | HEAD | 200 | 77.91.77.81:80 | http://77.91.77.81/cost/go.exe | unknown | — | — | unknown |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | GET | — | 77.91.77.81:80 | http://77.91.77.81/cost/go.exe | unknown | — | — | unknown |
1060 | svchost.exe | GET | 304 | 23.1.254.161:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8f69642324cc87bd | unknown | — | — | unknown |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | HEAD | 200 | 77.91.77.81:80 | http://77.91.77.81/cost/lenin.exe | unknown | — | — | unknown |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | GET | — | 77.91.77.81:80 | http://77.91.77.81/cost/lenin.exe | unknown | — | — | unknown |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | HEAD | 200 | 77.91.77.81:80 | http://77.91.77.81/mine/amadka.exe | unknown | — | — | unknown |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | GET | — | 77.91.77.81:80 | http://77.91.77.81/mine/amadka.exe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1060 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2564 | svchost.exe | 239.255.255.250:3702 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1372 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | 77.91.77.66:58709 | — | Foton Telecom CJSC | RU | malicious |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | 34.117.186.192:443 | ipinfo.io | GOOGLE-CLOUD-PLATFORM | US | unknown |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | 104.26.4.15:443 | db-ip.com | CLOUDFLARENET | US | unknown |
1372 | svchost.exe | 23.1.254.200:80 | ctldl.windowsupdate.com | Akamai International B.V. | FR | whitelisted |
1372 | svchost.exe | 23.36.76.91:80 | crl.microsoft.com | Akamai International B.V. | NO | unknown |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
ipinfo.io |
| shared |
db-ip.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 9 |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] RisePro TCP (Token) |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io) |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RisePro TCP (External IP) |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RisePro TCP (Token) |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | A Network Trojan was detected | ET MALWARE RisePro TCP Heartbeat Packet |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] RisePro TCP (External IP Check) |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] RisePro TCP (get_settings) |
3416 | d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RisePro TCP (Exfiltration) |
Process | Message |
---|---|
d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | ret 345 fdhg r |
d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | er er y try rtsdh |
d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | tr 656 56 65 8658 658hfty |
d0e3c511f4c02b9dd4130462ac716024ad29581a072a9095f40ac7c348c7ede6.exe | g 56 58y6 |