Resubmissions

18/09/2024, 11:32

240918-nnb8pazajl 10

19/11/2023, 08:48

231119-kqevtahc94 10

19/11/2023, 08:33

231119-kf81xaab91 10

19/11/2023, 08:31

231119-kenzcaab9x 10

16/11/2023, 13:30

231116-qrvkjsdd8t 10

Analysis

  • max time kernel
    473s
  • max time network
    446s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2023, 08:48

General

  • Target

    a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe

  • Size

    1.2MB

  • MD5

    0c8e88877383ccd23a755f429006b437

  • SHA1

    69b3d913a3967153d1e91ba1a31ebed839b297ed

  • SHA256

    a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6

  • SHA512

    ba5296a84b7107b293d1afd4752157edaa1a3f1059685ecad2ddea9b9221ee9c8092ce5cae6f2f6a4866e25ca0bf66dd3fbc0786b2a26cb708d2cd536dd85041

  • SSDEEP

    24576:utP7hdO1s6Skscec1SgnyN9HPFCCNhQI6GOfaFVIVrYwcMavDiZn3m75/J7:gLO1qkscec0gnyN9HPFCCNSI6GOfaFVp

Malware Config

Signatures

  • Detect Rhysida ransomware 4 IoCs
  • Rhysida

    Rhysida is a ransomware that is written in C++ and discovered in 2023.

  • Renames multiple (1695) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe
    "C:\Users\Admin\AppData\Local\Temp\a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3860
      • C:\Windows\system32\cmd.exe
        cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:548
        • C:\Windows\system32\reg.exe
          reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f
          4⤵
            PID:3184
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Windows\system32\cmd.exe
          cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1592
          • C:\Windows\system32\reg.exe
            reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f
            4⤵
              PID:3564
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1876
          • C:\Windows\system32\cmd.exe
            cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4816
            • C:\Windows\system32\reg.exe
              reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f
              4⤵
                PID:2980
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4220
            • C:\Windows\system32\cmd.exe
              cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4044
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f
                4⤵
                  PID:4836
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3268
              • C:\Windows\system32\cmd.exe
                cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4168
                • C:\Windows\system32\reg.exe
                  reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f
                  4⤵
                  • Sets desktop wallpaper using registry
                  PID:4500
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2224
              • C:\Windows\system32\cmd.exe
                cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:5112
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f
                  4⤵
                    PID:2784
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:3380
                • C:\Windows\system32\cmd.exe
                  cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4364
                  • C:\Windows\system32\reg.exe
                    reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f
                    4⤵
                      PID:2180
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4832
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4416
                    • C:\Windows\system32\reg.exe
                      reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f
                      4⤵
                        PID:1068
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c rundll32.exe user32.dll,UpdatePerUserSystemParameters
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1724
                    • C:\Windows\system32\rundll32.exe
                      rundll32.exe user32.dll,UpdatePerUserSystemParameters
                      3⤵
                        PID:1964
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c cmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe" -ErrorAction SilentlyContinue;
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1492
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe" -ErrorAction SilentlyContinue;
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3004
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe" -ErrorAction SilentlyContinue;
                          4⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4912
                  • C:\Windows\system32\rundll32.exe
                    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                    1⤵
                      PID:220
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4576

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Comms\Unistore\data\temp\CriticalBreachDetected.pdf

                      Filesize

                      34KB

                      MD5

                      1d46ad90f66560050686f1dda381a6af

                      SHA1

                      399e868c010a0453fd19c39ab7ddbd0294258ca9

                      SHA256

                      d16fffe21e66ae6b976c4ea7c8fcd37ca7b624961430144117eaa989e02fced1

                      SHA512

                      96af5adecd5aea2a38272c47fa4c256ad0e8986a7bab34e9b132610db8c90005d65984dcb7e93d24366c91c3f23442f623340dd14d4eba3de1fb0d7a737c9e6f

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qsnbktck.ta0.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • memory/2316-483-0x0000000000400000-0x0000000000522000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2316-484-0x0000000000400000-0x0000000000522000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2316-485-0x0000000000400000-0x0000000000522000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2316-486-0x0000000000400000-0x0000000000522000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/4576-558-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-551-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-569-0x000001C3953F0000-0x000001C3953F1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-567-0x000001C393BD0000-0x000001C393BD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-566-0x000001C393BC0000-0x000001C393BC1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-504-0x000001C38B740000-0x000001C38B750000-memory.dmp

                      Filesize

                      64KB

                    • memory/4576-520-0x000001C38B840000-0x000001C38B850000-memory.dmp

                      Filesize

                      64KB

                    • memory/4576-539-0x000001C393A40000-0x000001C393A41000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-541-0x000001C393B80000-0x000001C393B81000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-543-0x000001C393B80000-0x000001C393B81000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-544-0x000001C393B90000-0x000001C393B91000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-545-0x000001C393B90000-0x000001C393B91000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-546-0x000001C393B90000-0x000001C393B91000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-547-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-548-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-549-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-550-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-565-0x000001C393BC0000-0x000001C393BC1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-552-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-553-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-554-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-555-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-556-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-557-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-564-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-559-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-560-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-561-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-562-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4576-563-0x000001C393BB0000-0x000001C393BB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4912-497-0x00007FF8506B0000-0x00007FF851171000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4912-498-0x0000022D233C0000-0x0000022D233D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4912-503-0x00007FF8506B0000-0x00007FF851171000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4912-499-0x0000022D233C0000-0x0000022D233D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4912-487-0x0000022D234D0000-0x0000022D234F2000-memory.dmp

                      Filesize

                      136KB

                    • memory/4912-500-0x0000022D233C0000-0x0000022D233D0000-memory.dmp

                      Filesize

                      64KB