Overview
overview
9Static
static
7ryomen-gen.rar
windows7-x64
3ryomen-gen.rar
windows10-2004-x64
3ryomen-gen...g.json
windows7-x64
3ryomen-gen...g.json
windows10-2004-x64
3ryomen-gen...gs.vbs
windows7-x64
1ryomen-gen...gs.vbs
windows10-2004-x64
1ryomen-gen...ol.exe
windows7-x64
7ryomen-gen...ol.exe
windows10-2004-x64
7out.exe
windows7-x64
out.exe
windows10-2004-x64
ryomen-gen...ol.ini
windows7-x64
1ryomen-gen...ol.ini
windows10-2004-x64
1ryomen-gen...me.txt
windows7-x64
1ryomen-gen...me.txt
windows10-2004-x64
1ryomen-gen/ryomen.exe
windows7-x64
9ryomen-gen/ryomen.exe
windows10-2004-x64
9ryomen.pyc
windows7-x64
3ryomen.pyc
windows10-2004-x64
3Analysis
-
max time kernel
136s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 01:58
Behavioral task
behavioral1
Sample
ryomen-gen.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ryomen-gen.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ryomen-gen/config.json
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
ryomen-gen/config.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ryomen-gen/dcontrol/Defender_Settings.vbs
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
ryomen-gen/dcontrol/Defender_Settings.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ryomen-gen/dcontrol/dControl.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
ryomen-gen/dcontrol/dControl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
out.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
out.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ryomen-gen/dcontrol/dControl.ini
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
ryomen-gen/dcontrol/dControl.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ryomen-gen/read-me.txt
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
ryomen-gen/read-me.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ryomen-gen/ryomen.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
ryomen-gen/ryomen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ryomen.pyc
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
ryomen.pyc
Resource
win10v2004-20240802-en
General
-
Target
ryomen-gen/config.json
-
Size
61B
-
MD5
4e5ef75272ab12c993b68996ce50bca4
-
SHA1
31d17b2adf0e8f272b179d2fd2994e35ec30490c
-
SHA256
3fc0e76c1a731f056d4a3cefe628a6543bb62f9ab0c3e7fe773f4bafe0ccb1f4
-
SHA512
97a965db6be0a3ba4684ac6b7354d519e0ad5fc659265ac1edd1278e26feab63ea71706261c478992dbf0dd1b24fc4e846e7d5fe7bcd66de8b47fdb031e569d9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2628 OpenWith.exe