IOC Report
rise2406.exe

loading gif

Files

File Path
Type
Category
Malicious
rise2406.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rise2406.exe_a2fa92cb97a2b320a08f8e64ea523b20ebb5f8f1_8f97a443_dd428d2d-1b53-456e-afc5-446050e7694b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E75.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 26 06:57:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F7F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FAF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rise2406.exe
"C:\Users\user\Desktop\rise2406.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 140

URLs

Name
IP
Malicious
https://db-ip.com:443/demo/home.php?s=8.46.123.33J
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33
unknown
https://ipinfo.io/
34.117.186.192
https://ipinfo.io/widget/demo/8.46.123.33
34.117.186.192
https://ipinfo.io/q
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://db-ip.com/
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33
172.67.75.166
https://ipinfo.io/widget/demo/8.46.123.33:
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
172.67.75.166

IPs

IP
Domain
Country
Malicious
5.42.67.8
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
172.67.75.166
db-ip.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
ProgramId
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
FileId
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
LowerCaseLongPath
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
LongPathHash
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
Name
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
OriginalFileName
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
Publisher
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
Version
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
BinFileVersion
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
BinaryType
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
ProductName
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
ProductVersion
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
LinkDate
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
BinProductVersion
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
AppxPackageFullName
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
AppxPackageRelativeId
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
Size
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
Language
malicious
\REGISTRY\A\{d141827c-1b67-ff37-4247-d33102636bf2}\Root\InventoryApplicationFile\rise2406.exe|d05c044fc45916c1
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
DDF000
heap
page read and write
29FE000
stack
page read and write
DFD000
heap
page read and write
2A10000
heap
page read and write
DB9000
heap
page read and write
521000
unkown
page execute read
7A0000
direct allocation
page execute and read and write
3CC000
stack
page read and write
A3E000
heap
page read and write
DEA000
heap
page read and write
5060000
heap
page read and write
CFF000
stack
page read and write
D5A000
heap
page read and write
1010000
heap
page read and write
271D000
stack
page read and write
548000
unkown
page readonly
4CD000
stack
page read and write
29BE000
stack
page read and write
D50000
heap
page read and write
E4D000
heap
page read and write
DF8000
heap
page read and write
27BE000
stack
page read and write
554000
unkown
page write copy
DFF000
heap
page read and write
B7E000
stack
page read and write
7CC000
stack
page read and write
272D000
stack
page read and write
554000
unkown
page read and write
D9A000
heap
page read and write
6EA000
unkown
page readonly
A3A000
heap
page read and write
4B1E000
stack
page read and write
D88000
heap
page read and write
DA6000
heap
page read and write
A30000
heap
page read and write
26DF000
stack
page read and write
DFF000
stack
page read and write
B10000
heap
page read and write
74E000
stack
page read and write
6F0000
heap
page read and write
6CB000
stack
page read and write
FE0000
heap
page read and write
DD1000
heap
page read and write
505E000
stack
page read and write
A4D000
heap
page read and write
506D000
heap
page read and write
D9C000
heap
page read and write
BF5000
heap
page read and write
520000
unkown
page readonly
28BE000
stack
page read and write
281D000
stack
page read and write
DC5000
heap
page read and write
5064000
heap
page read and write
521000
unkown
page execute read
DA1000
heap
page read and write
400000
remote allocation
page execute and read and write
7C0000
heap
page read and write
D8C000
heap
page read and write
DC0000
heap
page read and write
A30000
heap
page read and write
DFA000
heap
page read and write
4F5F000
stack
page read and write
D96000
heap
page read and write
BBD000
stack
page read and write
25DE000
stack
page read and write
277E000
stack
page read and write
520000
unkown
page readonly
700000
heap
page read and write
BF0000
heap
page read and write
6EA000
unkown
page readonly
CFF000
stack
page read and write
548000
unkown
page readonly
78E000
stack
page read and write
There are 63 hidden memdumps, click here to show them.