Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:31
Static task
static1
Behavioral task
behavioral1
Sample
05d25579a65b40db44e4a29a5d4c5f80N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
05d25579a65b40db44e4a29a5d4c5f80N.exe
Resource
win10v2004-20240730-en
General
-
Target
05d25579a65b40db44e4a29a5d4c5f80N.exe
-
Size
932KB
-
MD5
05d25579a65b40db44e4a29a5d4c5f80
-
SHA1
55459850f8ebdadc86d7694db9d99ca55c60e210
-
SHA256
696ac8856cfd21ee8d292a1540be046dc6a9c47864c68ef95a0a9b237fc358a9
-
SHA512
6fee6f636ed6b90b40ab48858c4d34d9a6067ee208c6d4510f6000bf8ea229a9614a52563941a64914be0c1f52ed7b2c515db7f328f258618c0169dfad40eb36
-
SSDEEP
24576:71/aGLDCM4D8ayGMZo8/dXpPUA9aD1qGel:0D8ayGMZoKx19rGel
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2776 ryvekv.exe -
Loads dropped DLL 2 IoCs
pid Process 2788 05d25579a65b40db44e4a29a5d4c5f80N.exe 2788 05d25579a65b40db44e4a29a5d4c5f80N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\ryvekv.exe" ryvekv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05d25579a65b40db44e4a29a5d4c5f80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryvekv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2776 2788 05d25579a65b40db44e4a29a5d4c5f80N.exe 31 PID 2788 wrote to memory of 2776 2788 05d25579a65b40db44e4a29a5d4c5f80N.exe 31 PID 2788 wrote to memory of 2776 2788 05d25579a65b40db44e4a29a5d4c5f80N.exe 31 PID 2788 wrote to memory of 2776 2788 05d25579a65b40db44e4a29a5d4c5f80N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d25579a65b40db44e4a29a5d4c5f80N.exe"C:\Users\Admin\AppData\Local\Temp\05d25579a65b40db44e4a29a5d4c5f80N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\ProgramData\ryvekv.exe"C:\ProgramData\ryvekv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD5a24b0e5c982fec68a0e2f1d009808899
SHA1614b7e8b61cddbbf8dc5bab0288085310e8d47b4
SHA2567a11dc206081c08ca94df4a7616868de39b315dd78780c73b8deb20a9ce02ac8
SHA5126d0a006ececfe950353d70786325cb4949fd2cc14b5475493fe9edab3759446dedafe5c7c6cf3868a6fa38346ae6cbf5559d2249b90a4f36870a4035d958a348
-
Filesize
477KB
MD571e38cb8371fa644436922e0eee6040d
SHA16e9e897cb95fd8434891e87a584f5f1b9482cae2
SHA2562c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4
SHA512852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be
-
Filesize
454KB
MD5c3309b70fa11e5277b9e912ffd032d18
SHA130e3ef7543a02c2169a7baec326f6c2a405f1dd2
SHA2563e13f5ec8d65be681a1c7fe9be01a590481953ca427ad3c2833b405da78962ff
SHA512e8cb700d371c7e04bc9c5161f7e5bf5e4512f6fa4b3fccf7f6ff887f0894afc6dc0eff310f3b78314f4bec8a3203cb6075e665225a59b2b66191ad7ce5db1885