Analysis

  • max time kernel
    49s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03-05-2023 21:27

General

  • Target

    publish/Ryujinx.exe

  • Size

    48.4MB

  • MD5

    b0797f9198573f3ff62d1e0137fcdc32

  • SHA1

    e94a8393e836c3d8a461fa0b64127a8a082a7c62

  • SHA256

    201c6a39fb12daa53ba03b1a557acaedfe3bdd550687b39667c49b156ac926e9

  • SHA512

    766f27e2597af2bcdb6233cb972fac128297239ec30c721a59cc22cb9832e6a5ec4f5db1e249978570ec75e6780bf11f9e05d0994fed136da9a32757ac8e1f0a

  • SSDEEP

    196608:s7at47TJ7z4OW1pBeGh7byud8a8ypl54+b7nsq2kTTYHpGuC9Kmg9iKpzNWb/Uny:2atW17zli9byoplIMlavMGY1wTvq49GJ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\publish\Ryujinx.exe
    "C:\Users\Admin\AppData\Local\Temp\publish\Ryujinx.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Windows\system32\cmd.exe
      "cmd" /c start https://github.com/Ryujinx/Ryujinx/wiki/Ryujinx-Setup-^&-Configuration-Guide#initial-setup---placement-of-prodkeys
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/Ryujinx/Ryujinx/wiki/Ryujinx-Setup-&-Configuration-Guide#initial-setup---placement-of-prodkeys
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:668
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:668 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    471B

    MD5

    ece3dd668e7e85ccb9d9a66c9c91965e

    SHA1

    025c9cfbc0aac58afe1b8b3c8f22772c70d7bd30

    SHA256

    83d9440cea588149196eec01dfd56e030d3e39a6e711c7594b7c04ad3463edbe

    SHA512

    efe89f319bcb0caf4344a528ad1d12fc0bded1faa8ddbacc5f0618ecf9767cf684ef5f60f92e2298be701e130c3a3eff9cb2b4a92a778af748949d7101d943fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    421cf0530ea18648df3cf64b9a6d9053

    SHA1

    e8806d3f0406660f2fb09f84b2a7109885362e1c

    SHA256

    dfa6670abb679eb0e7e585d2b392dba2917080b105d8d16f9b4537e011ed8da3

    SHA512

    b1d95200646a52aeae235816364121739bd051ef82601902081fdd21cd570ce16612e26fb86b5865021201de62491d7792bdcecbfbccae2621a1265a70a45ef2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47566130c5f0c13dd985c69f008a2be7

    SHA1

    33ad75919b8ba8b98e4d9d89d6d0088afae6df02

    SHA256

    abe80e1e3c7695991c1f3e49b15d98769f5e9b71119dfc9a6ddde1a0ccaa218b

    SHA512

    e36b732669220ca5ba283b0cab0d5208270755ddf9baa4e4d863633b1f0c48fb3b955fe3203cd715db5f14176023700d6d7cf552a775afade78826c58477ff78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5ef6f0854b730e0e5249abf2a121aab

    SHA1

    6337f77eabf684b00bf54e7bc5c34104cefd35d1

    SHA256

    6a12f990024bb70c5aaa2bdc687a65b0b24a2b5f522a0d3d74433b5eca54221b

    SHA512

    b5c55690ea56451a796cd817dbe0ba24d5849d976b9f4c0023e10651462748f2e6c699f486c47f5f1738d8218167bebe1796808039c75bc437af4f48cd7baa76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    649e883449a9e3912191c3041c60c805

    SHA1

    c3e3b5d0a90fa7501430e101edba0052d837b0ff

    SHA256

    6091f7eb31b10ed8d14719f4d6584c010de85f169760edfeac101f72966f2408

    SHA512

    d7d84e2ccda28d0ba2640a662c28b64e832c699998e147a5d7cbb19106fdc2f08a9755dd12fbb34e6fd2728596bb7bd4a661611c00f384eba22ed12d947756c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c0eada1fe7caffe2260e3efb7c895cb

    SHA1

    ea69f4b5707468e52865c6975ae5bd5056183589

    SHA256

    d69b2e198268a271436978059b2a3ed1720c327442921297b5eaa10eda680848

    SHA512

    5aeea6c3dd6828c087d18891935b5539f8c578b8d22e0ec8ee783d9f4c0b32064f7ff71d0a22fb38cb6df7e2335890b1564db008834695a1a99486daeb26dc33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da15c5422bb45726e75116c45774adaa

    SHA1

    fd7033bdb7487ef1ef271e930c9e04fa78f48d20

    SHA256

    b30f34a017ce7a4c47f7254ac709155087028eb2489eab88e87f4d2f6139ec4d

    SHA512

    480cbebd31edb8485084c0554a80c278b02b90c52a33bdcc9cb77ff8421c6c9573d37e93ea2da9e1062cb3a88b509971c0916b4c3f1d0ecf2112e68f390900d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63828950f063e2bb0541ae55c141b433

    SHA1

    f80d8100e2c0e5d4970e875f2420e19906cb41da

    SHA256

    b92e57a6e6f5a14371d65b6c0f25661824ea13865db65048c7684100c263fc54

    SHA512

    de7d8440cdbd38b17ad9c96b9c60926d38a020546a7ef4b96a3d972aa3385e809fb615a865455e2869031c957c9fb57a0f54ef8260504abc2a3d1c085aaf23bc

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\x4s3ygl\imagestore.dat

    Filesize

    5KB

    MD5

    a4a91d29b15f86e6ecc3bf61b18144c6

    SHA1

    da779e8beeafd8507fb863f2bd4f901a64aa2586

    SHA256

    47c02bbb0ee41492e3b5cebab74e3749acf75e3cf457a4810c6820f3ff11239e

    SHA512

    4376e24c50e494712764dd898481df48f68574d54bb76ba990d14d93f2eab89a60e281f31258f9f274f07375e13425c9b6e50ce8d6ac439f494bfc661ec5c573

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BYN4WSI\favicon[1].png

    Filesize

    958B

    MD5

    346e09471362f2907510a31812129cd2

    SHA1

    323b99430dd424604ae57a19a91f25376e209759

    SHA256

    74cf90ac2fe6624ab1056cacea11cf7ed4f8bef54bbb0e869638013bba45bc08

    SHA512

    a62b0fcc02e671d6037725cf67935f8ca1c875f764ce39fed267420935c0b7bad69ab50d3f9f8c628e9b3cff439885ee416989e31ceaa5d32ae596dd7e5fedbd

  • C:\Users\Admin\AppData\Local\Temp\Cab82F.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar830.tmp

    Filesize

    161KB

    MD5

    73b4b714b42fc9a6aaefd0ae59adb009

    SHA1

    efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

    SHA256

    c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

    SHA512

    73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

  • C:\Users\Admin\AppData\Local\Temp\Tar932.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Ryujinx\bis\system\save\8000000000000000\ExtraData1

    Filesize

    512B

    MD5

    1356aaec630392dab0e8e7f6a542a276

    SHA1

    dc8664bc5a39c0ea5d579ebc77ccc489cebd0df5

    SHA256

    080ce7d553ba35f49daadc77b83bdef351d584fd651247effc3853d1553435c6

    SHA512

    bb82419aff6697e9ff9175ebf03e35d6ddcea82994752b9ae599247ef2e12df7123c31c68455570615476d95616d1680b9fe12d400a375585e9c18377713327e

  • C:\Users\Admin\AppData\Roaming\Ryujinx\bis\system\save\8000000000000000\ExtraData1

    Filesize

    512B

    MD5

    1356aaec630392dab0e8e7f6a542a276

    SHA1

    dc8664bc5a39c0ea5d579ebc77ccc489cebd0df5

    SHA256

    080ce7d553ba35f49daadc77b83bdef351d584fd651247effc3853d1553435c6

    SHA512

    bb82419aff6697e9ff9175ebf03e35d6ddcea82994752b9ae599247ef2e12df7123c31c68455570615476d95616d1680b9fe12d400a375585e9c18377713327e

  • memory/1172-80-0x000000006F740000-0x000000006F770000-memory.dmp

    Filesize

    192KB

  • memory/1172-89-0x000000006BD40000-0x000000006BD69000-memory.dmp

    Filesize

    164KB

  • memory/1172-68-0x0000000061CC0000-0x0000000061CE8000-memory.dmp

    Filesize

    160KB

  • memory/1172-69-0x0000000066000000-0x000000006610B000-memory.dmp

    Filesize

    1.0MB

  • memory/1172-70-0x0000000069140000-0x000000006918E000-memory.dmp

    Filesize

    312KB

  • memory/1172-71-0x0000000070540000-0x000000007056D000-memory.dmp

    Filesize

    180KB

  • memory/1172-72-0x000000006FC40000-0x000000006FDA5000-memory.dmp

    Filesize

    1.4MB

  • memory/1172-73-0x0000000068B40000-0x0000000068B80000-memory.dmp

    Filesize

    256KB

  • memory/1172-74-0x0000000062E80000-0x0000000062E9F000-memory.dmp

    Filesize

    124KB

  • memory/1172-75-0x0000000063500000-0x00000000635AC000-memory.dmp

    Filesize

    688KB

  • memory/1172-76-0x0000000067F00000-0x0000000067F57000-memory.dmp

    Filesize

    348KB

  • memory/1172-77-0x000000006B740000-0x000000006B750000-memory.dmp

    Filesize

    64KB

  • memory/1172-78-0x000000006D880000-0x000000006DA24000-memory.dmp

    Filesize

    1.6MB

  • memory/1172-79-0x0000000003850000-0x000000000387B000-memory.dmp

    Filesize

    172KB

  • memory/1172-66-0x0000000061600000-0x0000000061712000-memory.dmp

    Filesize

    1.1MB

  • memory/1172-81-0x0000000004B90000-0x0000000004D08000-memory.dmp

    Filesize

    1.5MB

  • memory/1172-82-0x0000000066C40000-0x0000000066C4F000-memory.dmp

    Filesize

    60KB

  • memory/1172-83-0x000000006D240000-0x000000006D288000-memory.dmp

    Filesize

    288KB

  • memory/1172-84-0x0000000003880000-0x0000000003899000-memory.dmp

    Filesize

    100KB

  • memory/1172-85-0x0000000068AC0000-0x0000000068AD1000-memory.dmp

    Filesize

    68KB

  • memory/1172-86-0x0000000065880000-0x0000000065898000-memory.dmp

    Filesize

    96KB

  • memory/1172-87-0x000000006E7C0000-0x000000006E7DC000-memory.dmp

    Filesize

    112KB

  • memory/1172-88-0x00000000676C0000-0x00000000676E1000-memory.dmp

    Filesize

    132KB

  • memory/1172-67-0x00000000649C0000-0x0000000064AE5000-memory.dmp

    Filesize

    1.1MB

  • memory/1172-135-0x0000000066400000-0x0000000066A43000-memory.dmp

    Filesize

    6.3MB

  • memory/1172-136-0x0000000070EC0000-0x0000000070FF0000-memory.dmp

    Filesize

    1.2MB

  • memory/1172-138-0x0000000068DC0000-0x0000000068EBE000-memory.dmp

    Filesize

    1016KB

  • memory/1172-140-0x0000000064940000-0x0000000064955000-memory.dmp

    Filesize

    84KB

  • memory/1172-146-0x00000000649C0000-0x0000000064AE5000-memory.dmp

    Filesize

    1.1MB

  • memory/1172-147-0x0000000061CC0000-0x0000000061CE8000-memory.dmp

    Filesize

    160KB

  • memory/1172-155-0x0000000067F00000-0x0000000067F57000-memory.dmp

    Filesize

    348KB

  • memory/1172-64-0x00000000693C0000-0x0000000069473000-memory.dmp

    Filesize

    716KB

  • memory/1172-65-0x00000000626C0000-0x00000000626DA000-memory.dmp

    Filesize

    104KB

  • memory/1172-63-0x0000000068F40000-0x0000000068F86000-memory.dmp

    Filesize

    280KB

  • memory/1172-62-0x0000000064F80000-0x0000000064FCE000-memory.dmp

    Filesize

    312KB

  • memory/1172-61-0x0000000064940000-0x0000000064955000-memory.dmp

    Filesize

    84KB

  • memory/1172-60-0x0000000061440000-0x000000006145C000-memory.dmp

    Filesize

    112KB

  • memory/1172-59-0x0000000068DC0000-0x0000000068EBE000-memory.dmp

    Filesize

    1016KB

  • memory/1172-58-0x000000006CF40000-0x000000006CF51000-memory.dmp

    Filesize

    68KB

  • memory/1172-57-0x0000000070EC0000-0x0000000070FF0000-memory.dmp

    Filesize

    1.2MB

  • memory/1172-56-0x0000000066400000-0x0000000066A43000-memory.dmp

    Filesize

    6.3MB

  • memory/1172-55-0x0000000004B90000-0x0000000004D08000-memory.dmp

    Filesize

    1.5MB

  • memory/1172-159-0x000000006F740000-0x000000006F770000-memory.dmp

    Filesize

    192KB

  • memory/1172-160-0x0000000004B90000-0x0000000004D08000-memory.dmp

    Filesize

    1.5MB

  • memory/1172-161-0x0000000066C40000-0x0000000066C4F000-memory.dmp

    Filesize

    60KB