Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_464.exe

Overview

General Information

Sample name:LisectAVT_2403002A_464.exe
Analysis ID:1482235
MD5:87c9aecd5886c99434358b6a7f42fde0
SHA1:a1424fb0f5bb9fb49a8797c4c43a7b8a4511b2cc
SHA256:6c0274f44ac55e0619f215604d918e9764ab221e08f2432cd08e65ac69d65652
Tags:exe
Infos:

Detection

RisePro Stealer
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected RisePro Stealer
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Potential thread-based time evasion detected
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • LisectAVT_2403002A_464.exe (PID: 6308 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_464.exe" MD5: 87C9AECD5886C99434358B6A7F42FDE0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: LisectAVT_2403002A_464.exe PID: 6308JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    0.2.LisectAVT_2403002A_464.exe.ae0000.0.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      No Sigma rule has matched
      No Snort rule has matched
      Timestamp:2024-07-25T19:50:26.187022+0200
      SID:2022930
      Source Port:443
      Destination Port:49731
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:2024-07-25T19:51:04.888134+0200
      SID:2022930
      Source Port:443
      Destination Port:49737
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:2024-07-25T19:50:13.255582+0200
      SID:2049060
      Source Port:49730
      Destination Port:50500
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:2024-07-25T19:50:16.240810+0200
      SID:2046269
      Source Port:49730
      Destination Port:50500
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: LisectAVT_2403002A_464.exeAvira: detected
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: LisectAVT_2403002A_464.exeJoe Sandbox ML: detected
      Source: LisectAVT_2403002A_464.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 193.233.132.109:50500
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.109
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.109
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.109
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.109
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.109
      Source: LisectAVT_2403002A_464.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
      Source: LisectAVT_2403002A_464.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
      Source: LisectAVT_2403002A_464.exeString found in binary or memory: http://ocsp.sectigo.com0
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115458295.0000000000BED000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115458295.0000000000BED000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
      Source: LisectAVT_2403002A_464.exeString found in binary or memory: https://sectigo.com/CPS0
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115173281.00000000007DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeProcess Stats: CPU usage > 49%
      Source: LisectAVT_2403002A_464.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@1/0@0/1
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeFile created: C:\Users\user\AppData\Local\Temp\adobeLrRccmkMEOIPJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115458295.0000000000BED000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115458295.0000000000BED000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeSection loaded: devobj.dllJump to behavior
      Source: LisectAVT_2403002A_464.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: LisectAVT_2403002A_464.exeStatic file information: File size 5668408 > 1048576
      Source: LisectAVT_2403002A_464.exeStatic PE information: Raw size of .vmp is bigger than: 0x100000 < 0x562e00
      Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp
      Source: LisectAVT_2403002A_464.exeStatic PE information: real checksum: 0x573781 should be: 0x573789
      Source: LisectAVT_2403002A_464.exeStatic PE information: section name: .vmp
      Source: LisectAVT_2403002A_464.exeStatic PE information: section name: .vmp
      Source: LisectAVT_2403002A_464.exeStatic PE information: section name: .vmp

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 2D20005 value: E9 8B 2F 1E 74 Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 76F02F90 value: E9 7A D0 E1 8B Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 2D30005 value: E9 2B BA 19 74 Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 76ECBA30 value: E9 DA 45 E6 8B Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 2D40008 value: E9 8B 8E 1D 74 Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 76F18E90 value: E9 80 71 E2 8B Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 2D70005 value: E9 8B 4D E8 72 Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 75BF4D90 value: E9 7A B2 17 8D Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 2D80005 value: E9 EB EB E8 72 Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 75C0EBF0 value: E9 1A 14 17 8D Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 2D90005 value: E9 8B 8A 24 72 Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 74FD8A90 value: E9 7A 75 DB 8D Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 2DA0005 value: E9 2B 02 26 72 Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeMemory written: PID: 6308 base: 75000230 value: E9 DA FD D9 8D Jump to behavior

      Malware Analysis System Evasion

      barindex
      Source: Initial fileSignature Results: Thread-based counter
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: 133A9D1
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: 1340A74
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: 142619C
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: F11939
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: F09639
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: 144863C
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: 1412270
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: FA7D2E
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: 137A1EC
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: 144ABE6
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: 136EE7F
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: FD3809
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeAPI/Special instruction interceptor: Address: 13B5472
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeRDTSC instruction interceptor: First address: CE0FCB second address: CE0FD6 instructions: 0x00000000 rdtsc 0x00000002 not eax 0x00000004 cdq 0x00000005 push ecx 0x00000006 mov ecx, dword ptr [ebp+18h] 0x00000009 cdq 0x0000000a cwde 0x0000000b rdtsc
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeWindow / User API: threadDelayed 1616Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeWindow / User API: threadDelayed 6759Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exe TID: 6336Thread sleep count: 43 > 30Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exe TID: 6336Thread sleep count: 1616 > 30Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exe TID: 6336Thread sleep time: -163216s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exe TID: 6548Thread sleep count: 316 > 30Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exe TID: 6336Thread sleep count: 6759 > 30Jump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exe TID: 6336Thread sleep time: -682659s >= -30000sJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeLast function: Thread delayed
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115173281.00000000007DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115173281.00000000007DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115173281.00000000007DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115173281.000000000080E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_6AE97C9A
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115085592.00000000006FD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}8
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115173281.000000000080E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: LisectAVT_2403002A_464.exe, 00000000.00000002.4115173281.000000000080E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ~-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_6AE97C9A
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeProcess Stats: CPU usage > 42% for more than 60s
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\LisectAVT_2403002A_464.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_464.exe.ae0000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_464.exe PID: 6308, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_464.exe.ae0000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_464.exe PID: 6308, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      DLL Side-Loading
      111
      Virtualization/Sandbox Evasion
      1
      Credential API Hooking
      41
      Security Software Discovery
      Remote Services1
      Credential API Hooking
      1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      DLL Side-Loading
      LSASS Memory111
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets313
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      LisectAVT_2403002A_464.exe100%AviraTR/Crypt.XPACK.Gen
      LisectAVT_2403002A_464.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
      http://www.winimage.com/zLibDll0%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
      https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
      https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllLisectAVT_2403002A_464.exe, 00000000.00000002.4115458295.0000000000BED000.00000002.00000001.01000000.00000003.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tLisectAVT_2403002A_464.exefalse
      • URL Reputation: safe
      unknown
      http://www.winimage.com/zLibDllLisectAVT_2403002A_464.exe, 00000000.00000002.4115458295.0000000000BED000.00000002.00000001.01000000.00000003.sdmpfalse
      • URL Reputation: safe
      unknown
      https://t.me/RiseProSUPPORTLisectAVT_2403002A_464.exe, 00000000.00000002.4115173281.00000000007DE000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://sectigo.com/CPS0LisectAVT_2403002A_464.exefalse
      • URL Reputation: safe
      unknown
      http://ocsp.sectigo.com0LisectAVT_2403002A_464.exefalse
      • URL Reputation: safe
      unknown
      http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#LisectAVT_2403002A_464.exefalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      193.233.132.109
      unknownRussian Federation
      2895FREE-NET-ASFREEnetEUfalse
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1482235
      Start date and time:2024-07-25 19:49:16 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 7m 0s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:LisectAVT_2403002A_464.exe
      Detection:MAL
      Classification:mal84.troj.evad.winEXE@1/0@0/1
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240000 for current running targets taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: LisectAVT_2403002A_464.exe
      TimeTypeDescription
      13:50:46API Interceptor1017453x Sleep call for process: LisectAVT_2403002A_464.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      193.233.132.109d2Qy58urPx.exeGet hashmaliciousRisePro StealerBrowse
        d2Qy58urPx.exeGet hashmaliciousRisePro StealerBrowse
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          FREE-NET-ASFREEnetEULisectAVT_2403002A_79.exeGet hashmaliciousAmadeyBrowse
          • 193.233.132.56
          LisectAVT_2403002B_242.exeGet hashmaliciousRisePro StealerBrowse
          • 193.233.132.74
          LisectAVT_2403002B_433.exeGet hashmaliciousAmadeyBrowse
          • 193.233.132.56
          Lisect_AVT_24003_G1B_108.exeGet hashmaliciousRisePro StealerBrowse
          • 193.233.132.62
          Lisect_AVT_24003_G1A_89.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
          • 193.233.132.62
          Lisect_AVT_24003_G1A_37.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
          • 193.233.132.62
          LisectAVT_2403002A_262.exeGet hashmaliciousRisePro StealerBrowse
          • 193.233.132.190
          LisectAVT_2403002A_224.exeGet hashmaliciousRisePro StealerBrowse
          • 193.233.132.74
          hunta[1].exeGet hashmaliciousBdaejec, RisePro StealerBrowse
          • 193.233.132.62
          External Own 4.20.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
          • 147.45.47.64
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.991535674205282
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:LisectAVT_2403002A_464.exe
          File size:5'668'408 bytes
          MD5:87c9aecd5886c99434358b6a7f42fde0
          SHA1:a1424fb0f5bb9fb49a8797c4c43a7b8a4511b2cc
          SHA256:6c0274f44ac55e0619f215604d918e9764ab221e08f2432cd08e65ac69d65652
          SHA512:10086695bd697a181f694949846178ea195ba3e0b44eed39aa054110448bcdfddd8bce6cfaf1e7d9476d017425e9b6c3ba7c8d6b76bb0597cee2b0294dc9c2c9
          SSDEEP:98304:B9jwL5kme5BYsmXZp9i/OcQItBftG3w+CdnFs/djCfnqg3mePCCFE:B1aime8L0mI7fpjnFsfahPv
          TLSH:C746334DD1D50694E4E6A6B00B12F8FDB3FF2AAD02A4CD6E809C6EC599F31B56332047
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...eM.f...............'.....D........M...........@..................................7W...@..........................MB.J..
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x8dcbe2
          Entrypoint Section:.vmp
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
          Time Stamp:0x66004D65 [Sun Mar 24 15:57:25 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:84d3942a6283bd1fa0ecc5bc71ddea94
          Signature Valid:
          Signature Issuer:
          Signature Validation Error:
          Error Number:
          Not Before, Not After
            Subject Chain
              Version:
              Thumbprint MD5:
              Thumbprint SHA-1:
              Thumbprint SHA-256:
              Serial:
              Instruction
              push DA0101A8h
              call 00007F7F14CD75C0h
              or dx, ax
              not dx
              mov word ptr [ebp+00h], dx
              push E69FFE8Ah
              push 813E8EAEh
              push 3403E280h
              lea esp, dword ptr [esp+0Ch]
              jmp 00007F7F14C2DAF2h
              mov eax, 69A0649Ah
              mov ecx, eax
              mov ecx, dword ptr [edi+ecx-69A0649Ah]
              jmp 00007F7F14CD773Dh
              stc
              sbb ecx, dword ptr [ecx-214C6741h]
              xor byte ptr [ecx+04D112C0h], ch
              mov bh, 0Ch
              xchg bl, cl
              mov dl, 81h
              xlatb
              add dword ptr [eax], eax
              add byte ptr [eax], al
              call 00007F7F14C19866h
              call 00007F7F1482F27Ch
              lea esp, dword ptr [esp+04h]
              jmp 00007F7F14812551h
              or eax, 0A06A506h
              leave
              xchg eax, edi
              inc esp
              pop ebx
              pushad
              mov al, byte ptr [81A64553h]
              sbb ch, byte ptr [edx]
              popad
              mov bl, FFh
              imul esp, dword ptr [esi+eax*2], 04h
              add al, B5h
              retn 3DC7h
              cld
              in al, dx
              in al, 16h
              fdiv dword ptr [eax+34h]
              cmpsb
              not dword ptr [esi]
              xchg eax, esp
              call dword ptr [edx]
              fcomp qword ptr [ecx]
              cmp ebp, ecx
              lahf
              inc ebp
              loop 00007F7F14859155h
              inc edx
              test eax, 84F08622h
              inc ecx
              aam 88h
              inc ecx
              or ah, byte ptr fs:[esi+37h]
              or eax, 823852DFh
              add byte ptr [ebx+56h], ch
              mov ebp, 1F0D59C3h
              leave
              jnp 00007F7F1485916Eh
              or al, al
              aaa
              aad C5h
              xchg dword ptr [ecx], ebp
              imul esi, esp, 00h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x424de80x4a.vmp
              IMAGE_DIRECTORY_ENTRY_IMPORT0x8fe3780x140.vmp
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x9880000xe93.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x5666000x1830.vmp
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x9860000x1a98.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x9857e00x40.vmp
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x4220000x8c.vmp
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x10b0f80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x10d0000x203900x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x12e0000x48a80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .vmp0x1330000x2eec110x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .vmp0x4220000x7000x800f36abdb4ad7e16b133d5827f133ae594False0.05419921875data0.3480864167488688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .vmp0x4230000x562cf00x562e00f28215bad4588669c5dbfe7d99128426unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .reloc0x9860000x1a980x1c0064157f39c4b8aa8f5979a0fb59a16b74False0.38657924107142855data5.8131576082052465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0x9880000xe930x10007b97c7abf28a679b0a4090ae34d08bbeFalse0.355224609375data4.992629817806596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_MANIFEST0x9880580xe3bXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.38594564919022784
              DLLImport
              KERNEL32.dllGetVersionExA
              USER32.dllwsprintfA
              GDI32.dllCreateCompatibleBitmap
              ADVAPI32.dllRegCreateKeyExA
              SHELL32.dllShellExecuteA
              ole32.dllCoInitialize
              WS2_32.dllWSAStartup
              CRYPT32.dllCryptUnprotectData
              SHLWAPI.dllPathFindExtensionA
              gdiplus.dllGdipGetImageEncoders
              SETUPAPI.dllSetupDiEnumDeviceInfo
              ntdll.dllRtlUnicodeStringToAnsiString
              RstrtMgr.DLLRmStartSession
              KERNEL32.dllGetSystemTimeAsFileTime
              KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
              NameOrdinalAddress
              Start10x466a40
              TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
              2024-07-25T19:50:26.187022+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973140.127.169.103192.168.2.4
              2024-07-25T19:51:04.888134+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973740.127.169.103192.168.2.4
              2024-07-25T19:50:13.255582+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4973050500192.168.2.4193.233.132.109
              2024-07-25T19:50:16.240810+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4973050500192.168.2.4193.233.132.109
              TimestampSource PortDest PortSource IPDest IP
              Jul 25, 2024 19:50:13.083185911 CEST4973050500192.168.2.4193.233.132.109
              Jul 25, 2024 19:50:13.239038944 CEST5050049730193.233.132.109192.168.2.4
              Jul 25, 2024 19:50:13.239362001 CEST4973050500192.168.2.4193.233.132.109
              Jul 25, 2024 19:50:13.255582094 CEST4973050500192.168.2.4193.233.132.109
              Jul 25, 2024 19:50:13.265921116 CEST5050049730193.233.132.109192.168.2.4
              Jul 25, 2024 19:50:16.240809917 CEST4973050500192.168.2.4193.233.132.109
              Jul 25, 2024 19:50:16.248016119 CEST5050049730193.233.132.109192.168.2.4
              Jul 25, 2024 19:50:34.630662918 CEST5050049730193.233.132.109192.168.2.4
              Jul 25, 2024 19:50:34.630851984 CEST4973050500192.168.2.4193.233.132.109

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:13:50:05
              Start date:25/07/2024
              Path:C:\Users\user\Desktop\LisectAVT_2403002A_464.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_464.exe"
              Imagebase:0xae0000
              File size:5'668'408 bytes
              MD5 hash:87C9AECD5886C99434358B6A7F42FDE0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:false

              No disassembly