Analysis
-
max time kernel
49s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2023 21:27
Behavioral task
behavioral1
Sample
publish/Ryujinx.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
publish/Ryujinx.exe
Resource
win10v2004-20230221-en
General
-
Target
publish/Ryujinx.exe
-
Size
48.4MB
-
MD5
b0797f9198573f3ff62d1e0137fcdc32
-
SHA1
e94a8393e836c3d8a461fa0b64127a8a082a7c62
-
SHA256
201c6a39fb12daa53ba03b1a557acaedfe3bdd550687b39667c49b156ac926e9
-
SHA512
766f27e2597af2bcdb6233cb972fac128297239ec30c721a59cc22cb9832e6a5ec4f5db1e249978570ec75e6780bf11f9e05d0994fed136da9a32757ac8e1f0a
-
SSDEEP
196608:s7at47TJ7z4OW1pBeGh7byud8a8ypl54+b7nsq2kTTYHpGuC9Kmg9iKpzNWb/Uny:2atW17zli9byoplIMlavMGY1wTvq49GJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85F75991-EA0A-11ED-ABDC-CEF47884BE6D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 668 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
Ryujinx.exeiexplore.exeIEXPLORE.EXEpid process 1172 Ryujinx.exe 668 iexplore.exe 668 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Ryujinx.execmd.exeiexplore.exedescription pid process target process PID 1172 wrote to memory of 1576 1172 Ryujinx.exe cmd.exe PID 1172 wrote to memory of 1576 1172 Ryujinx.exe cmd.exe PID 1172 wrote to memory of 1576 1172 Ryujinx.exe cmd.exe PID 1576 wrote to memory of 668 1576 cmd.exe iexplore.exe PID 1576 wrote to memory of 668 1576 cmd.exe iexplore.exe PID 1576 wrote to memory of 668 1576 cmd.exe iexplore.exe PID 668 wrote to memory of 1708 668 iexplore.exe IEXPLORE.EXE PID 668 wrote to memory of 1708 668 iexplore.exe IEXPLORE.EXE PID 668 wrote to memory of 1708 668 iexplore.exe IEXPLORE.EXE PID 668 wrote to memory of 1708 668 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\publish\Ryujinx.exe"C:\Users\Admin\AppData\Local\Temp\publish\Ryujinx.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\system32\cmd.exe"cmd" /c start https://github.com/Ryujinx/Ryujinx/wiki/Ryujinx-Setup-^&-Configuration-Guide#initial-setup---placement-of-prodkeys2⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/Ryujinx/Ryujinx/wiki/Ryujinx-Setup-&-Configuration-Guide#initial-setup---placement-of-prodkeys3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:668 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD5ece3dd668e7e85ccb9d9a66c9c91965e
SHA1025c9cfbc0aac58afe1b8b3c8f22772c70d7bd30
SHA25683d9440cea588149196eec01dfd56e030d3e39a6e711c7594b7c04ad3463edbe
SHA512efe89f319bcb0caf4344a528ad1d12fc0bded1faa8ddbacc5f0618ecf9767cf684ef5f60f92e2298be701e130c3a3eff9cb2b4a92a778af748949d7101d943fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5421cf0530ea18648df3cf64b9a6d9053
SHA1e8806d3f0406660f2fb09f84b2a7109885362e1c
SHA256dfa6670abb679eb0e7e585d2b392dba2917080b105d8d16f9b4537e011ed8da3
SHA512b1d95200646a52aeae235816364121739bd051ef82601902081fdd21cd570ce16612e26fb86b5865021201de62491d7792bdcecbfbccae2621a1265a70a45ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547566130c5f0c13dd985c69f008a2be7
SHA133ad75919b8ba8b98e4d9d89d6d0088afae6df02
SHA256abe80e1e3c7695991c1f3e49b15d98769f5e9b71119dfc9a6ddde1a0ccaa218b
SHA512e36b732669220ca5ba283b0cab0d5208270755ddf9baa4e4d863633b1f0c48fb3b955fe3203cd715db5f14176023700d6d7cf552a775afade78826c58477ff78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ef6f0854b730e0e5249abf2a121aab
SHA16337f77eabf684b00bf54e7bc5c34104cefd35d1
SHA2566a12f990024bb70c5aaa2bdc687a65b0b24a2b5f522a0d3d74433b5eca54221b
SHA512b5c55690ea56451a796cd817dbe0ba24d5849d976b9f4c0023e10651462748f2e6c699f486c47f5f1738d8218167bebe1796808039c75bc437af4f48cd7baa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5649e883449a9e3912191c3041c60c805
SHA1c3e3b5d0a90fa7501430e101edba0052d837b0ff
SHA2566091f7eb31b10ed8d14719f4d6584c010de85f169760edfeac101f72966f2408
SHA512d7d84e2ccda28d0ba2640a662c28b64e832c699998e147a5d7cbb19106fdc2f08a9755dd12fbb34e6fd2728596bb7bd4a661611c00f384eba22ed12d947756c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c0eada1fe7caffe2260e3efb7c895cb
SHA1ea69f4b5707468e52865c6975ae5bd5056183589
SHA256d69b2e198268a271436978059b2a3ed1720c327442921297b5eaa10eda680848
SHA5125aeea6c3dd6828c087d18891935b5539f8c578b8d22e0ec8ee783d9f4c0b32064f7ff71d0a22fb38cb6df7e2335890b1564db008834695a1a99486daeb26dc33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da15c5422bb45726e75116c45774adaa
SHA1fd7033bdb7487ef1ef271e930c9e04fa78f48d20
SHA256b30f34a017ce7a4c47f7254ac709155087028eb2489eab88e87f4d2f6139ec4d
SHA512480cbebd31edb8485084c0554a80c278b02b90c52a33bdcc9cb77ff8421c6c9573d37e93ea2da9e1062cb3a88b509971c0916b4c3f1d0ecf2112e68f390900d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563828950f063e2bb0541ae55c141b433
SHA1f80d8100e2c0e5d4970e875f2420e19906cb41da
SHA256b92e57a6e6f5a14371d65b6c0f25661824ea13865db65048c7684100c263fc54
SHA512de7d8440cdbd38b17ad9c96b9c60926d38a020546a7ef4b96a3d972aa3385e809fb615a865455e2869031c957c9fb57a0f54ef8260504abc2a3d1c085aaf23bc
-
Filesize
5KB
MD5a4a91d29b15f86e6ecc3bf61b18144c6
SHA1da779e8beeafd8507fb863f2bd4f901a64aa2586
SHA25647c02bbb0ee41492e3b5cebab74e3749acf75e3cf457a4810c6820f3ff11239e
SHA5124376e24c50e494712764dd898481df48f68574d54bb76ba990d14d93f2eab89a60e281f31258f9f274f07375e13425c9b6e50ce8d6ac439f494bfc661ec5c573
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BYN4WSI\favicon[1].png
Filesize958B
MD5346e09471362f2907510a31812129cd2
SHA1323b99430dd424604ae57a19a91f25376e209759
SHA25674cf90ac2fe6624ab1056cacea11cf7ed4f8bef54bbb0e869638013bba45bc08
SHA512a62b0fcc02e671d6037725cf67935f8ca1c875f764ce39fed267420935c0b7bad69ab50d3f9f8c628e9b3cff439885ee416989e31ceaa5d32ae596dd7e5fedbd
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
512B
MD51356aaec630392dab0e8e7f6a542a276
SHA1dc8664bc5a39c0ea5d579ebc77ccc489cebd0df5
SHA256080ce7d553ba35f49daadc77b83bdef351d584fd651247effc3853d1553435c6
SHA512bb82419aff6697e9ff9175ebf03e35d6ddcea82994752b9ae599247ef2e12df7123c31c68455570615476d95616d1680b9fe12d400a375585e9c18377713327e
-
Filesize
512B
MD51356aaec630392dab0e8e7f6a542a276
SHA1dc8664bc5a39c0ea5d579ebc77ccc489cebd0df5
SHA256080ce7d553ba35f49daadc77b83bdef351d584fd651247effc3853d1553435c6
SHA512bb82419aff6697e9ff9175ebf03e35d6ddcea82994752b9ae599247ef2e12df7123c31c68455570615476d95616d1680b9fe12d400a375585e9c18377713327e