Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_479.exe

Overview

General Information

Sample name:LisectAVT_2403002A_479.exe
Analysis ID:1481056
MD5:910182267ab297ced9fa6cac86f93c3e
SHA1:ba9d0f067c51fa7ab9e2c3af128d4e3a9f2c28b9
SHA256:9e2a3d673b97bbb4b879907a6de4217907800192401dc404af51953e59765838
Tags:exe
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected RisePro Stealer
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • LisectAVT_2403002A_479.exe (PID: 1992 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_479.exe" MD5: 910182267AB297CED9FA6CAC86F93C3E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: LisectAVT_2403002A_479.exe PID: 1992JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    No Sigma rule has matched
    No Snort rule has matched
    Timestamp:2024-07-25T03:41:06.983629+0200
    SID:2022930
    Source Port:443
    Destination Port:49705
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-25T03:40:54.209208+0200
    SID:2046269
    Source Port:49704
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-25T03:40:51.217940+0200
    SID:2049060
    Source Port:49704
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-25T03:41:44.914483+0200
    SID:2022930
    Source Port:443
    Destination Port:49710
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: LisectAVT_2403002A_479.exeAvira: detected
    Source: LisectAVT_2403002A_479.exeReversingLabs: Detection: 47%
    Source: LisectAVT_2403002A_479.exeVirustotal: Detection: 56%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: LisectAVT_2403002A_479.exeJoe Sandbox ML: detected
    Source: LisectAVT_2403002A_479.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: LisectAVT_2403002A_479.exe, 00000000.00000002.3857894357.00000000005DF000.00000040.00000001.01000000.00000003.sdmp
    Source: global trafficTCP traffic: 192.168.2.8:49704 -> 5.42.65.117:50500
    Source: Joe Sandbox ViewIP Address: 5.42.65.117 5.42.65.117
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.117
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.117
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.117
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.117
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.117
    Source: LisectAVT_2403002A_479.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
    Source: LisectAVT_2403002A_479.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
    Source: LisectAVT_2403002A_479.exeString found in binary or memory: http://ocsp.sectigo.com0
    Source: LisectAVT_2403002A_479.exe, 00000000.00000003.1407231196.00000000031F0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_479.exe, 00000000.00000002.3857412181.000000000047F000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
    Source: LisectAVT_2403002A_479.exe, 00000000.00000003.1407231196.00000000031F0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_479.exe, 00000000.00000002.3857412181.000000000047F000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
    Source: LisectAVT_2403002A_479.exeString found in binary or memory: https://sectigo.com/CPS0
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT#

    System Summary

    barindex
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name:
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name:
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name:
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name:
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name:
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeProcess Stats: CPU usage > 49%
    Source: LisectAVT_2403002A_479.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: LisectAVT_2403002A_479.exeStatic PE information: Section: ZLIB complexity 0.9999294582392777
    Source: LisectAVT_2403002A_479.exeStatic PE information: Section: ZLIB complexity 0.9995163690476191
    Source: LisectAVT_2403002A_479.exeStatic PE information: Section: ZLIB complexity 1.0003507829822615
    Source: LisectAVT_2403002A_479.exeStatic PE information: Section: ZLIB complexity 1.0009469696969697
    Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/1
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeFile created: C:\Users\user\AppData\Local\Temp\adobe9w_PptQiwNFfJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: LisectAVT_2403002A_479.exe, 00000000.00000003.1407231196.00000000031F0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_479.exe, 00000000.00000002.3857412181.000000000047F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
    Source: LisectAVT_2403002A_479.exe, 00000000.00000003.1407231196.00000000031F0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_479.exe, 00000000.00000002.3857412181.000000000047F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
    Source: LisectAVT_2403002A_479.exeReversingLabs: Detection: 47%
    Source: LisectAVT_2403002A_479.exeVirustotal: Detection: 56%
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeSection loaded: devobj.dllJump to behavior
    Source: LisectAVT_2403002A_479.exeStatic file information: File size 3554604 > 1048576
    Source: LisectAVT_2403002A_479.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x280200
    Source: Binary string: Z:\Development\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: LisectAVT_2403002A_479.exe, 00000000.00000002.3857894357.00000000005DF000.00000040.00000001.01000000.00000003.sdmp
    Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
    Source: LisectAVT_2403002A_479.exeStatic PE information: real checksum: 0x373bc0 should be: 0x373bc4
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name:
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name:
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name:
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name:
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name:
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name: .themida
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name: .boot
    Source: LisectAVT_2403002A_479.exeStatic PE information: section name: entropy: 7.999574265479796

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeWindow searched: window name: FilemonClassJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeWindow searched: window name: RegmonClassJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeSystem information queried: FirmwareTableInformationJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeWindow / User API: threadDelayed 2705Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeWindow / User API: threadDelayed 5680Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exe TID: 608Thread sleep count: 113 > 30Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exe TID: 608Thread sleep count: 2705 > 30Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exe TID: 608Thread sleep time: -273205s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exe TID: 1152Thread sleep count: 326 > 30Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exe TID: 608Thread sleep count: 5680 > 30Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exe TID: 608Thread sleep time: -573680s >= -30000sJump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeLast function: Thread delayed
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}J
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_821047A6
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}%%
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
    Source: LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}l
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeSystem information queried: ModuleInformationJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeProcess Stats: CPU usage > 42% for more than 60s
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeThread information set: HideFromDebuggerJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeOpen window title or class name: regmonclass
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeOpen window title or class name: gbdyllo
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeOpen window title or class name: procmon_window_class
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeOpen window title or class name: ollydbg
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeOpen window title or class name: filemonclass
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeProcess queried: DebugObjectHandleJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeProcess queried: DebugPortJump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_479.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_479.exe PID: 1992, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_479.exe PID: 1992, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    DLL Side-Loading
    431
    Virtualization/Sandbox Evasion
    OS Credential Dumping621
    Security Software Discovery
    Remote ServicesData from Local System1
    Non-Standard Port
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
    Software Packing
    LSASS Memory431
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets14
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    LisectAVT_2403002A_479.exe47%ReversingLabsWin32.Trojan.RisePro
    LisectAVT_2403002A_479.exe57%VirustotalBrowse
    LisectAVT_2403002A_479.exe100%AviraTR/Kryptik.emawy
    LisectAVT_2403002A_479.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
    http://www.winimage.com/zLibDll0%URL Reputationsafe
    https://sectigo.com/CPS00%URL Reputationsafe
    https://sectigo.com/CPS00%URL Reputationsafe
    http://ocsp.sectigo.com00%URL Reputationsafe
    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
    https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
    https://t.me/RiseProSUPPORT#0%Avira URL Cloudsafe
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
    https://t.me/RiseProSUPPORT0%VirustotalBrowse
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%VirustotalBrowse
    https://t.me/RiseProSUPPORT#0%VirustotalBrowse
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllLisectAVT_2403002A_479.exe, 00000000.00000003.1407231196.00000000031F0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_479.exe, 00000000.00000002.3857412181.000000000047F000.00000002.00000001.01000000.00000003.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tLisectAVT_2403002A_479.exefalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://www.winimage.com/zLibDllLisectAVT_2403002A_479.exe, 00000000.00000003.1407231196.00000000031F0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_479.exe, 00000000.00000002.3857412181.000000000047F000.00000002.00000001.01000000.00000003.sdmpfalse
    • URL Reputation: safe
    unknown
    https://t.me/RiseProSUPPORTLisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011CE000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://sectigo.com/CPS0LisectAVT_2403002A_479.exefalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    https://t.me/RiseProSUPPORT#LisectAVT_2403002A_479.exe, 00000000.00000002.3859430143.00000000011CE000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://ocsp.sectigo.com0LisectAVT_2403002A_479.exefalse
    • URL Reputation: safe
    unknown
    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#LisectAVT_2403002A_479.exefalse
    • URL Reputation: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    5.42.65.117
    unknownRussian Federation
    39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1481056
    Start date and time:2024-07-25 03:39:51 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 22s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:LisectAVT_2403002A_479.exe
    Detection:MAL
    Classification:mal100.troj.evad.winEXE@1/0@0/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240000 for current running targets taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    21:41:23API Interceptor1242476x Sleep call for process: LisectAVT_2403002A_479.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    5.42.65.117ws7tj0VzXA.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
      file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
        file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
          file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
            i1crvbOZAP.exeGet hashmaliciousAmadey, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
              file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
                R7piqpsoTx.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
                  MJ2Ltjq5mk.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
                    file.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                      PkSZDobcRa.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU7d69f17f.exeGet hashmaliciousRedLineBrowse
                        • 45.15.156.186
                        25C1.exeGet hashmaliciousGlupteba, XmrigBrowse
                        • 5.42.64.33
                        #Ud83c#Udf0dimpactfulbrands.co.uk__________________________________________.html.batGet hashmaliciousRedLineBrowse
                        • 45.15.157.131
                        https://45.15.156.174/index.php/s/24Sr2FjZQm8gXFA/download/ketamine.exeGet hashmaliciousUnknownBrowse
                        • 45.15.156.174
                        cKt8r2v7Gy.exeGet hashmaliciousUnknownBrowse
                        • 5.42.99.177
                        build.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                        • 45.15.156.127
                        selup_4.55.exeGet hashmaliciousRedLineBrowse
                        • 5.42.104.154
                        setup.exeGet hashmaliciousLummaC, Mars Stealer, PureLog Stealer, RedLine, Stealc, Stealerium, VidarBrowse
                        • 5.42.99.177
                        HDzcvviCBD.exeGet hashmaliciousDCRatBrowse
                        • 5.42.104.244
                        1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                        • 5.42.99.177
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):7.946262039056646
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:LisectAVT_2403002A_479.exe
                        File size:3'554'604 bytes
                        MD5:910182267ab297ced9fa6cac86f93c3e
                        SHA1:ba9d0f067c51fa7ab9e2c3af128d4e3a9f2c28b9
                        SHA256:9e2a3d673b97bbb4b879907a6de4217907800192401dc404af51953e59765838
                        SHA512:92c313640fddf3ddf0dd6491de8182597df5848240f8791543459240bcf2ceeb8f76e98add171831aaa9fea1001625bbc68f7c5a2f6aebb232f536c1acca0d2a
                        SSDEEP:49152:J1UHC6vWZtnxJB9qBBmAAcuXshmk2sP4gNi1KEj39tpz7vDZvtNUZRMYDiTYwEqe:J1+WZtzDqBScuXKmk2RXKi17NteXW6S0
                        TLSH:F4F5116336DBDA0ADBF23071D614B1541FC41A3FDE015232B5BE1961BAB806D7FA3A81
                        File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$......."...f.{Tf.{Tf.{T-.xUk.{T-.~U..{T-.|Ug.{T)..Tb.{T)..Ut.{T).xUq.{T).~U3.{T-..U..{T-.}Ug.{T-.zU}.{Tf.zT@.{T..rUz.{T..{Ug.{T...Tg.{
                        Icon Hash:0767f35b5b190877
                        Entrypoint:0xb83420
                        Entrypoint Section:.boot
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                        Time Stamp:0x65FD62AE [Fri Mar 22 10:51:26 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:a21d450c6ebc519c43c3140940327537
                        Signature Valid:
                        Signature Issuer:
                        Signature Validation Error:
                        Error Number:
                        Not Before, Not After
                          Subject Chain
                            Version:
                            Thumbprint MD5:
                            Thumbprint SHA-1:
                            Thumbprint SHA-256:
                            Serial:
                            Instruction
                            call 00007F99F0EB0A90h
                            push ebx
                            mov ebx, esp
                            push ebx
                            mov esi, dword ptr [ebx+08h]
                            mov edi, dword ptr [ebx+10h]
                            cld
                            mov dl, 80h
                            mov al, byte ptr [esi]
                            inc esi
                            mov byte ptr [edi], al
                            inc edi
                            mov ebx, 00000002h
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            jnc 00007F99F0EB092Ch
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            jnc 00007F99F0EB0993h
                            xor eax, eax
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            jnc 00007F99F0EB0A27h
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            adc eax, eax
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            adc eax, eax
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            adc eax, eax
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            adc eax, eax
                            je 00007F99F0EB094Ah
                            push edi
                            mov eax, eax
                            sub edi, eax
                            mov al, byte ptr [edi]
                            pop edi
                            mov byte ptr [edi], al
                            inc edi
                            mov ebx, 00000002h
                            jmp 00007F99F0EB08DBh
                            mov eax, 00000001h
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            adc eax, eax
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            jc 00007F99F0EB092Ch
                            sub eax, ebx
                            mov ebx, 00000001h
                            jne 00007F99F0EB096Ah
                            mov ecx, 00000001h
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            adc ecx, ecx
                            add dl, dl
                            jne 00007F99F0EB0947h
                            mov dl, byte ptr [esi]
                            inc esi
                            adc dl, dl
                            jc 00007F99F0EB092Ch
                            push esi
                            mov esi, edi
                            sub esi, ebp
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x24d0000x4a.edata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x24e1860x184.idata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x24f0000x1f0fc.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x358c000xb128.themida
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            0x10000x10d2580x6ec0042b75a934e60af05762db9349278fbd5False0.9999294582392777data7.999574265479796IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            0x10f0000x23cd80xd2005d6f217582e2b5601961c5bac74ed1c3False0.9995163690476191DOS executable (COM)7.996635211250757IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            0x1330000x48c00x8005f08560d32032a4cc8b9979a668ac1b3False0.98828125data7.7311140633497475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            0x1380000x10ccda0x3860019673fc0bc0116cfce1791701a6d7437False1.0003507829822615data7.999069106813043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            0x2450000x7abc0x4200617f24bb41fa218319f7d7940f4b5df5False1.0009469696969697data7.988893594056409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            .edata0x24d0000x10000x200f10540b5c8ca418218c2a8d71a21b012False0.1328125data0.8242398042708359IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .idata0x24e0000x10000x40014c095e0f39d36de1452c68662e483d3False0.396484375data3.3950569900948193IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x24f0000x1f2000x1f200d9e80c2605f69efe9f06be32a245d2dfFalse0.5392429091365462data6.115776630952482IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .themida0x26f0000x5140000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .boot0x7830000x2802000x280200a6567c6bf5e90bfbee995e0924dbcbfcunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x24f1400x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.4089513462446859
                            RT_ICON0x2533780x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.29615225363776176
                            RT_ICON0x263bb00x9c5ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9991506370222333
                            RT_STRING0x26d8200x226dataEnglishUnited States0.5
                            RT_GROUP_ICON0x26da580x30dataEnglishUnited States0.8541666666666666
                            RT_MANIFEST0x26da980x664XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3643031784841076
                            DLLImport
                            kernel32.dllGetModuleHandleA
                            USER32.dllwsprintfA
                            GDI32.dllCreateCompatibleBitmap
                            ADVAPI32.dllRegCloseKey
                            SHELL32.dllShellExecuteA
                            ole32.dllCoInitialize
                            WS2_32.dllWSAStartup
                            CRYPT32.dllCryptUnprotectData
                            SHLWAPI.dllPathFindExtensionA
                            gdiplus.dllGdipGetImageEncoders
                            SETUPAPI.dllSetupDiEnumDeviceInfo
                            ntdll.dllRtlUnicodeStringToAnsiString
                            RstrtMgr.DLLRmStartSession
                            NameOrdinalAddress
                            Start10x466e80
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                            2024-07-25T03:41:06.983629+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970552.165.165.26192.168.2.8
                            2024-07-25T03:40:54.209208+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4970450500192.168.2.85.42.65.117
                            2024-07-25T03:40:51.217940+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4970450500192.168.2.85.42.65.117
                            2024-07-25T03:41:44.914483+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971052.165.165.26192.168.2.8
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 25, 2024 03:40:51.192308903 CEST4970450500192.168.2.85.42.65.117
                            Jul 25, 2024 03:40:51.197596073 CEST50500497045.42.65.117192.168.2.8
                            Jul 25, 2024 03:40:51.197711945 CEST4970450500192.168.2.85.42.65.117
                            Jul 25, 2024 03:40:51.217940092 CEST4970450500192.168.2.85.42.65.117
                            Jul 25, 2024 03:40:51.222759008 CEST50500497045.42.65.117192.168.2.8
                            Jul 25, 2024 03:40:54.209208012 CEST4970450500192.168.2.85.42.65.117
                            Jul 25, 2024 03:40:54.214102030 CEST50500497045.42.65.117192.168.2.8
                            Jul 25, 2024 03:41:12.589904070 CEST50500497045.42.65.117192.168.2.8
                            Jul 25, 2024 03:41:12.590034962 CEST4970450500192.168.2.85.42.65.117

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:21:40:46
                            Start date:24/07/2024
                            Path:C:\Users\user\Desktop\LisectAVT_2403002A_479.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_479.exe"
                            Imagebase:0x370000
                            File size:3'554'604 bytes
                            MD5 hash:910182267AB297CED9FA6CAC86F93C3E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            No disassembly