Resubmissions
18/09/2024, 11:32
240918-nnb8pazajl 1019/11/2023, 08:48
231119-kqevtahc94 1019/11/2023, 08:33
231119-kf81xaab91 1019/11/2023, 08:31
231119-kenzcaab9x 1016/11/2023, 13:30
231116-qrvkjsdd8t 10Analysis
-
max time kernel
530s -
max time network
364s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
19/11/2023, 08:33
Behavioral task
behavioral1
Sample
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe
Resource
win10v2004-20231023-en
General
-
Target
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe
-
Size
1.2MB
-
MD5
0c8e88877383ccd23a755f429006b437
-
SHA1
69b3d913a3967153d1e91ba1a31ebed839b297ed
-
SHA256
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6
-
SHA512
ba5296a84b7107b293d1afd4752157edaa1a3f1059685ecad2ddea9b9221ee9c8092ce5cae6f2f6a4866e25ca0bf66dd3fbc0786b2a26cb708d2cd536dd85041
-
SSDEEP
24576:utP7hdO1s6Skscec1SgnyN9HPFCCNhQI6GOfaFVIVrYwcMavDiZn3m75/J7:gLO1qkscec0gnyN9HPFCCNSI6GOfaFVp
Malware Config
Signatures
-
Detect Rhysida ransomware 2 IoCs
resource yara_rule behavioral1/memory/3048-696-0x0000000000400000-0x0000000000522000-memory.dmp family_rhysida behavioral1/memory/3048-1206-0x0000000000400000-0x0000000000522000-memory.dmp family_rhysida -
Rhysida
Rhysida is a ransomware that is written in C++ and discovered in 2023.
-
Renames multiple (666) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3744 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3744 AcroRd32.exe 3744 AcroRd32.exe 3744 AcroRd32.exe 1720 AcroRd32.exe 1720 AcroRd32.exe 1720 AcroRd32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe"C:\Users\Admin\AppData\Local\Temp\a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe"1⤵PID:3048
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\CriticalBreachDetected.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3744
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵PID:4088
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Public\Desktop\CriticalBreachDetected.pdf"1⤵
- Suspicious use of SetWindowsHookEx
PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD51d46ad90f66560050686f1dda381a6af
SHA1399e868c010a0453fd19c39ab7ddbd0294258ca9
SHA256d16fffe21e66ae6b976c4ea7c8fcd37ca7b624961430144117eaa989e02fced1
SHA51296af5adecd5aea2a38272c47fa4c256ad0e8986a7bab34e9b132610db8c90005d65984dcb7e93d24366c91c3f23442f623340dd14d4eba3de1fb0d7a737c9e6f
-
Filesize
7KB
MD556a3b9a3768ba32cd712688d0ad21af7
SHA15aa194ffaa91c34c10776b46b77c5da9ee2f33a2
SHA25642f2e8872c4c0ef8e467d7772ca023ac6c75579ea52d5fff9778393021b1d569
SHA512f2d2183e7f73176bf71d895d02703042b97c82e55371842f8554dff3f86a3994fdc9eb270ae25ef03ab011abf2196291bc7746c7ffaa4d1731de119e2124ce58
-
Filesize
520B
MD553bd58c6f9e020b598f78cbc1dd3000d
SHA1cb250e18d3d1c8715fda47c33920f7ea19230be5
SHA2568d115d2a0eaa709aab9914fa77b042601c5f0fbd6179840f4715ce85323cf47c
SHA512de61dea0d4760483a24fa4d8ecd4dad9ed93d6a4d267b9fc5cd887aa63e3a8a2974f51e2b3a46068f5111d7a575e8a22ffa38f8b03bf08e26a63fbe97678a30b
-
Filesize
135KB
MD5a3e82779d757fb4faf9cc73237c18b8a
SHA1ea034b8be607b5244f71e3611aea533aba490177
SHA256d4c9d7a37ef7b1dfa3411ff02127df69b6aab8f3e08abd8dacdaae5fb9fe0d9a
SHA512b256f6f0e2566d86188ee56c9cf0e5ad28231a92cbea8368a178347ac75fa653f964340db541bddd7c7de7f66b918f2c51a4e8243b504b475c9ac09dd760c44f
-
Filesize
3KB
MD5afc156169808860651c973d7e79c7db4
SHA118ee15783fa018a19a545a83ab70a991f53fa4ae
SHA2566c50e7ba625fa078a6899340c327032e0aa83b62ff152a6b111aa17ea82f41fe
SHA51218e7463a6de93affa15ea3330e78b6354b999e17070028b374b8ae6548050f4979470ac6603ba5d0112a0658494e0aebd00c1944a34e183ebe3bcd36ac6580a3
-
Filesize
3KB
MD58742fa021a7973d8535070856459a5c3
SHA130fa13c05600723306bb63031229f712d4677c6d
SHA25624184b03605c080ffd2e08f5db641821dc95f8df04e146c4e261bc8cc02d26c0
SHA512fc6511f5d4cf315597a8a8b85c40bdfb778b8b2d71267e178140ec068c1cf6b440bdbe953561e13d36d894cc0277f1c664dccd7632058da679d7f7aafeeb3f3b
-
Filesize
70KB
MD5888b67a2da8bebdd2f7cac38df89583b
SHA1834eb0a2df7cf2828867b8e5fa1391a9d8b43937
SHA256a575a8dbef0aa06d55c3fa35d2391d7ba67c9b11ed98cfa737b90c8e99b0836e
SHA5123e445fec4da57208640a8ba89ca55edeba01b1480456914a74ccc22edf3ce6cccd2eeec129c9df69e9f095f17c31394c97995272275fc66d6719c9af3810496f
-
Filesize
34KB
MD51d46ad90f66560050686f1dda381a6af
SHA1399e868c010a0453fd19c39ab7ddbd0294258ca9
SHA256d16fffe21e66ae6b976c4ea7c8fcd37ca7b624961430144117eaa989e02fced1
SHA51296af5adecd5aea2a38272c47fa4c256ad0e8986a7bab34e9b132610db8c90005d65984dcb7e93d24366c91c3f23442f623340dd14d4eba3de1fb0d7a737c9e6f
-
Filesize
34KB
MD51d46ad90f66560050686f1dda381a6af
SHA1399e868c010a0453fd19c39ab7ddbd0294258ca9
SHA256d16fffe21e66ae6b976c4ea7c8fcd37ca7b624961430144117eaa989e02fced1
SHA51296af5adecd5aea2a38272c47fa4c256ad0e8986a7bab34e9b132610db8c90005d65984dcb7e93d24366c91c3f23442f623340dd14d4eba3de1fb0d7a737c9e6f