Overview
overview
10Static
static
1100.exe
windows7-x64
8100.exe
windows10-2004-x64
10101.exe
windows7-x64
1101.exe
windows10-2004-x64
1102.exe
windows7-x64
8102.exe
windows10-2004-x64
5103.exe
windows7-x64
8103.exe
windows10-2004-x64
1105.exe
windows7-x64
10105.exe
windows10-2004-x64
10106.exe
windows7-x64
8106.exe
windows10-2004-x64
1107.exe
windows7-x64
6107.exe
windows10-2004-x64
6108.exe
windows7-x64
10108.exe
windows10-2004-x64
10109.exe
windows7-x64
10109.exe
windows10-2004-x64
5110.exe
windows7-x64
10110.exe
windows10-2004-x64
10111.exe
windows7-x64
10111.exe
windows10-2004-x64
10112.exe
windows7-x64
8112.exe
windows10-2004-x64
7113.exe
windows7-x64
10113.exe
windows10-2004-x64
10114.exe
windows7-x64
10114.exe
windows10-2004-x64
8115.exe
windows7-x64
10115.exe
windows10-2004-x64
10116.exe
windows7-x64
8116.exe
windows10-2004-x64
7Analysis
-
max time kernel
151s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 11:26
Static task
static1
Behavioral task
behavioral1
Sample
100.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
100.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
101.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
101.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
102.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
102.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
103.exe
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
103.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
105.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
105.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
106.exe
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
106.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
107.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
107.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
108.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
108.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
109.exe
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
109.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral19
Sample
110.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
110.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
111.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
111.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
112.exe
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
112.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
113.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
113.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
114.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
114.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
115.exe
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
115.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
116.exe
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
116.exe
Resource
win10v2004-20221111-en
General
-
Target
112.exe
-
Size
187KB
-
MD5
1b16b152c1fde08b8089adf6132f5d4d
-
SHA1
025f3f3760221f62415376ac2ecb6bd8d426762e
-
SHA256
1fc0ea9775d1a71a08af06b83e829664b19a9122ce0dfececfc205aa72fcbc44
-
SHA512
7af997e7b9daa383f6956d9c267ae14d83c223a625a47d5c5c7b9a1391c04332f4315d0ae314d2ab7ea1648c9db2d3b60251e431d288909dd9f31ce8cddaff4e
-
SSDEEP
3072:EDQkrZoosbIfXJMq6WLs0JiG3VU2wBOZfYyqUElu/UvymUPPGwuDjwauVxrITZFE:EDpoeCOLNHFU2COZfYyTElu86mpFwa6/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2036 ryin.exe 1692 ryin.exe -
Deletes itself 1 IoCs
pid Process 1264 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1948 112.exe 908 112.exe 2036 ryin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run ryin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{62815F61-29E8-01E3-B22D-9034FB6E0543} = "C:\\Users\\Admin\\AppData\\Roaming\\Cauh\\ryin.exe" ryin.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1948 set thread context of 908 1948 112.exe 28 PID 2036 set thread context of 1692 2036 ryin.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 8 IoCs
resource yara_rule behavioral23/files/0x000c00000001232f-68.dat nsis_installer_1 behavioral23/files/0x000c00000001232f-68.dat nsis_installer_2 behavioral23/files/0x000c00000001232f-70.dat nsis_installer_1 behavioral23/files/0x000c00000001232f-70.dat nsis_installer_2 behavioral23/files/0x000c00000001232f-72.dat nsis_installer_1 behavioral23/files/0x000c00000001232f-72.dat nsis_installer_2 behavioral23/files/0x000c00000001232f-83.dat nsis_installer_1 behavioral23/files/0x000c00000001232f-83.dat nsis_installer_2 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 112.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 112.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe 1692 ryin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 908 112.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 908 1948 112.exe 28 PID 1948 wrote to memory of 908 1948 112.exe 28 PID 1948 wrote to memory of 908 1948 112.exe 28 PID 1948 wrote to memory of 908 1948 112.exe 28 PID 1948 wrote to memory of 908 1948 112.exe 28 PID 1948 wrote to memory of 908 1948 112.exe 28 PID 1948 wrote to memory of 908 1948 112.exe 28 PID 1948 wrote to memory of 908 1948 112.exe 28 PID 1948 wrote to memory of 908 1948 112.exe 28 PID 908 wrote to memory of 2036 908 112.exe 29 PID 908 wrote to memory of 2036 908 112.exe 29 PID 908 wrote to memory of 2036 908 112.exe 29 PID 908 wrote to memory of 2036 908 112.exe 29 PID 2036 wrote to memory of 1692 2036 ryin.exe 30 PID 2036 wrote to memory of 1692 2036 ryin.exe 30 PID 2036 wrote to memory of 1692 2036 ryin.exe 30 PID 2036 wrote to memory of 1692 2036 ryin.exe 30 PID 2036 wrote to memory of 1692 2036 ryin.exe 30 PID 2036 wrote to memory of 1692 2036 ryin.exe 30 PID 2036 wrote to memory of 1692 2036 ryin.exe 30 PID 2036 wrote to memory of 1692 2036 ryin.exe 30 PID 2036 wrote to memory of 1692 2036 ryin.exe 30 PID 1692 wrote to memory of 1120 1692 ryin.exe 10 PID 1692 wrote to memory of 1120 1692 ryin.exe 10 PID 1692 wrote to memory of 1120 1692 ryin.exe 10 PID 1692 wrote to memory of 1120 1692 ryin.exe 10 PID 1692 wrote to memory of 1120 1692 ryin.exe 10 PID 1692 wrote to memory of 1176 1692 ryin.exe 18 PID 1692 wrote to memory of 1176 1692 ryin.exe 18 PID 1692 wrote to memory of 1176 1692 ryin.exe 18 PID 1692 wrote to memory of 1176 1692 ryin.exe 18 PID 1692 wrote to memory of 1176 1692 ryin.exe 18 PID 1692 wrote to memory of 1204 1692 ryin.exe 17 PID 1692 wrote to memory of 1204 1692 ryin.exe 17 PID 1692 wrote to memory of 1204 1692 ryin.exe 17 PID 1692 wrote to memory of 1204 1692 ryin.exe 17 PID 1692 wrote to memory of 1204 1692 ryin.exe 17 PID 1692 wrote to memory of 908 1692 ryin.exe 28 PID 1692 wrote to memory of 908 1692 ryin.exe 28 PID 1692 wrote to memory of 908 1692 ryin.exe 28 PID 1692 wrote to memory of 908 1692 ryin.exe 28 PID 1692 wrote to memory of 908 1692 ryin.exe 28 PID 908 wrote to memory of 1264 908 112.exe 31 PID 908 wrote to memory of 1264 908 112.exe 31 PID 908 wrote to memory of 1264 908 112.exe 31 PID 908 wrote to memory of 1264 908 112.exe 31 PID 1692 wrote to memory of 1264 1692 ryin.exe 31 PID 1692 wrote to memory of 1264 1692 ryin.exe 31 PID 1692 wrote to memory of 1264 1692 ryin.exe 31 PID 1692 wrote to memory of 1264 1692 ryin.exe 31 PID 1692 wrote to memory of 1264 1692 ryin.exe 31 PID 1692 wrote to memory of 1300 1692 ryin.exe 32 PID 1692 wrote to memory of 868 1692 ryin.exe 33 PID 1692 wrote to memory of 868 1692 ryin.exe 33 PID 1692 wrote to memory of 868 1692 ryin.exe 33 PID 1692 wrote to memory of 868 1692 ryin.exe 33 PID 1692 wrote to memory of 868 1692 ryin.exe 33 PID 1692 wrote to memory of 1080 1692 ryin.exe 34 PID 1692 wrote to memory of 1080 1692 ryin.exe 34 PID 1692 wrote to memory of 1080 1692 ryin.exe 34 PID 1692 wrote to memory of 1080 1692 ryin.exe 34 PID 1692 wrote to memory of 1080 1692 ryin.exe 34 PID 1692 wrote to memory of 588 1692 ryin.exe 35 PID 1692 wrote to memory of 588 1692 ryin.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\112.exe"C:\Users\Admin\AppData\Local\Temp\112.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\112.exe"C:\Users\Admin\AppData\Local\Temp\112.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Roaming\Cauh\ryin.exe"C:\Users\Admin\AppData\Roaming\Cauh\ryin.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\Cauh\ryin.exe"C:\Users\Admin\AppData\Roaming\Cauh\ryin.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc877edf3.bat"4⤵
- Deletes itself
PID:1264
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-3124889851794076942-1228023509-11776573181557249878-1955140193538318072-616653782"1⤵PID:1300
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:868
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1080
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185B
MD593bac90b76c04d323c6b83d68889e365
SHA1c29529fbd38bff6c318beacd5df375c517c75e4c
SHA256662bea481412385b9c73fc2bf8e21914f56a149790c2ab71edb0f6cd01a50fe0
SHA5123c900d6b14faa28ddf2333a034ebb6cab1e66f1890baa29e75347a5593bf404fe3b8fca19a435f25a608c1a3fc7bee720d252de5b24a923b276514534279495c
-
Filesize
187KB
MD51265678ac187c8267a5bcf9098e59641
SHA1ca7aa3af555469b497679421024828f8a5086871
SHA25630e8ddfe87a2b3e69210be686fce61a3883d849e9680f27a23f37d30dc360da3
SHA5122d13b2b5a346f28060c3ff572e90a15c14e03b61898309b895dd97524b6725b12e965c291724b6114cc9f6e3c53dadc80d01576aacb611ea5de1588b35e4a2df
-
Filesize
187KB
MD51265678ac187c8267a5bcf9098e59641
SHA1ca7aa3af555469b497679421024828f8a5086871
SHA25630e8ddfe87a2b3e69210be686fce61a3883d849e9680f27a23f37d30dc360da3
SHA5122d13b2b5a346f28060c3ff572e90a15c14e03b61898309b895dd97524b6725b12e965c291724b6114cc9f6e3c53dadc80d01576aacb611ea5de1588b35e4a2df
-
Filesize
187KB
MD51265678ac187c8267a5bcf9098e59641
SHA1ca7aa3af555469b497679421024828f8a5086871
SHA25630e8ddfe87a2b3e69210be686fce61a3883d849e9680f27a23f37d30dc360da3
SHA5122d13b2b5a346f28060c3ff572e90a15c14e03b61898309b895dd97524b6725b12e965c291724b6114cc9f6e3c53dadc80d01576aacb611ea5de1588b35e4a2df
-
Filesize
16KB
MD51236c52aeb7ff29f443d50e4d326d0d1
SHA1ee19d4a6a2ed9985b691b851ac0caba3268b0981
SHA2568aba0509facbd46831ce38a569acf5909efd5c0a84aeca1fe80774b9879ed5b2
SHA51289831f7fd674c92ef2ff08a711d326170324d0cfa0064dd38a0063b27986b4f4e7ecb538ab5bb816c8cc3059fe25bdceadc8452f40e08874f6e46c1b14dfbd17
-
Filesize
16KB
MD51236c52aeb7ff29f443d50e4d326d0d1
SHA1ee19d4a6a2ed9985b691b851ac0caba3268b0981
SHA2568aba0509facbd46831ce38a569acf5909efd5c0a84aeca1fe80774b9879ed5b2
SHA51289831f7fd674c92ef2ff08a711d326170324d0cfa0064dd38a0063b27986b4f4e7ecb538ab5bb816c8cc3059fe25bdceadc8452f40e08874f6e46c1b14dfbd17
-
Filesize
187KB
MD51265678ac187c8267a5bcf9098e59641
SHA1ca7aa3af555469b497679421024828f8a5086871
SHA25630e8ddfe87a2b3e69210be686fce61a3883d849e9680f27a23f37d30dc360da3
SHA5122d13b2b5a346f28060c3ff572e90a15c14e03b61898309b895dd97524b6725b12e965c291724b6114cc9f6e3c53dadc80d01576aacb611ea5de1588b35e4a2df