Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
sample.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
sample.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
rhysida.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
rhysida.exe
Resource
win10v2004-20230703-en
General
-
Target
rhysida.exe
-
Size
1.2MB
-
MD5
0c8e88877383ccd23a755f429006b437
-
SHA1
69b3d913a3967153d1e91ba1a31ebed839b297ed
-
SHA256
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6
-
SHA512
ba5296a84b7107b293d1afd4752157edaa1a3f1059685ecad2ddea9b9221ee9c8092ce5cae6f2f6a4866e25ca0bf66dd3fbc0786b2a26cb708d2cd536dd85041
-
SSDEEP
24576:utP7hdO1s6Skscec1SgnyN9HPFCCNhQI6GOfaFVIVrYwcMavDiZn3m75/J7:gLO1qkscec0gnyN9HPFCCNSI6GOfaFVp
Malware Config
Signatures
-
Renames multiple (1621) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Public\\bg.jpg" reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2724 powershell.exe 2724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2724 powershell.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 4616 wrote to memory of 5024 4616 rhysida.exe 99 PID 4616 wrote to memory of 5024 4616 rhysida.exe 99 PID 5024 wrote to memory of 4988 5024 cmd.exe 100 PID 5024 wrote to memory of 4988 5024 cmd.exe 100 PID 4988 wrote to memory of 3940 4988 cmd.exe 101 PID 4988 wrote to memory of 3940 4988 cmd.exe 101 PID 4616 wrote to memory of 2792 4616 rhysida.exe 102 PID 4616 wrote to memory of 2792 4616 rhysida.exe 102 PID 2792 wrote to memory of 3192 2792 cmd.exe 103 PID 2792 wrote to memory of 3192 2792 cmd.exe 103 PID 3192 wrote to memory of 4488 3192 cmd.exe 104 PID 3192 wrote to memory of 4488 3192 cmd.exe 104 PID 4616 wrote to memory of 1908 4616 rhysida.exe 105 PID 4616 wrote to memory of 1908 4616 rhysida.exe 105 PID 1908 wrote to memory of 4780 1908 cmd.exe 106 PID 1908 wrote to memory of 4780 1908 cmd.exe 106 PID 4780 wrote to memory of 3284 4780 cmd.exe 107 PID 4780 wrote to memory of 3284 4780 cmd.exe 107 PID 4616 wrote to memory of 2488 4616 rhysida.exe 108 PID 4616 wrote to memory of 2488 4616 rhysida.exe 108 PID 2488 wrote to memory of 1904 2488 cmd.exe 109 PID 2488 wrote to memory of 1904 2488 cmd.exe 109 PID 1904 wrote to memory of 1408 1904 cmd.exe 110 PID 1904 wrote to memory of 1408 1904 cmd.exe 110 PID 4616 wrote to memory of 4008 4616 rhysida.exe 111 PID 4616 wrote to memory of 4008 4616 rhysida.exe 111 PID 4008 wrote to memory of 1828 4008 cmd.exe 112 PID 4008 wrote to memory of 1828 4008 cmd.exe 112 PID 4616 wrote to memory of 2748 4616 rhysida.exe 114 PID 4616 wrote to memory of 2748 4616 rhysida.exe 114 PID 2748 wrote to memory of 4440 2748 cmd.exe 115 PID 2748 wrote to memory of 4440 2748 cmd.exe 115 PID 4440 wrote to memory of 3656 4440 cmd.exe 116 PID 4440 wrote to memory of 3656 4440 cmd.exe 116 PID 4616 wrote to memory of 4916 4616 rhysida.exe 117 PID 4616 wrote to memory of 4916 4616 rhysida.exe 117 PID 4916 wrote to memory of 3840 4916 cmd.exe 118 PID 4916 wrote to memory of 3840 4916 cmd.exe 118 PID 3840 wrote to memory of 1468 3840 cmd.exe 119 PID 3840 wrote to memory of 1468 3840 cmd.exe 119 PID 4616 wrote to memory of 3184 4616 rhysida.exe 120 PID 4616 wrote to memory of 3184 4616 rhysida.exe 120 PID 3184 wrote to memory of 3832 3184 cmd.exe 121 PID 3184 wrote to memory of 3832 3184 cmd.exe 121 PID 3832 wrote to memory of 1956 3832 cmd.exe 122 PID 3832 wrote to memory of 1956 3832 cmd.exe 122 PID 4616 wrote to memory of 1452 4616 rhysida.exe 123 PID 4616 wrote to memory of 1452 4616 rhysida.exe 123 PID 1452 wrote to memory of 392 1452 cmd.exe 124 PID 1452 wrote to memory of 392 1452 cmd.exe 124 PID 4616 wrote to memory of 4076 4616 rhysida.exe 125 PID 4616 wrote to memory of 4076 4616 rhysida.exe 125 PID 4076 wrote to memory of 2636 4076 cmd.exe 126 PID 4076 wrote to memory of 2636 4076 cmd.exe 126 PID 2636 wrote to memory of 2724 2636 cmd.exe 127 PID 2636 wrote to memory of 2724 2636 cmd.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\rhysida.exe"C:\Users\Admin\AppData\Local\Temp\rhysida.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f2⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f3⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f4⤵PID:3940
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f2⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f3⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f4⤵PID:4488
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:3284
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:1408
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵PID:1828
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵
- Sets desktop wallpaper using registry
PID:2032
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵PID:3656
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:1468
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:1956
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe user32.dll,UpdatePerUserSystemParameters2⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\system32\rundll32.exerundll32.exe user32.dll,UpdatePerUserSystemParameters3⤵PID:392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\rhysida.exe" -ErrorAction SilentlyContinue;2⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\system32\cmd.execmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\rhysida.exe" -ErrorAction SilentlyContinue;3⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\rhysida.exe" -ErrorAction SilentlyContinue;4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82