Overview
overview
9Static
static
7ryomen-gen.rar
windows7-x64
3ryomen-gen.rar
windows10-2004-x64
3ryomen-gen...g.json
windows7-x64
3ryomen-gen...g.json
windows10-2004-x64
3ryomen-gen...gs.vbs
windows7-x64
1ryomen-gen...gs.vbs
windows10-2004-x64
1ryomen-gen...ol.exe
windows7-x64
7ryomen-gen...ol.exe
windows10-2004-x64
7out.exe
windows7-x64
out.exe
windows10-2004-x64
ryomen-gen...ol.ini
windows7-x64
1ryomen-gen...ol.ini
windows10-2004-x64
1ryomen-gen...me.txt
windows7-x64
1ryomen-gen...me.txt
windows10-2004-x64
1ryomen-gen/ryomen.exe
windows7-x64
9ryomen-gen/ryomen.exe
windows10-2004-x64
9ryomen.pyc
windows7-x64
3ryomen.pyc
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 01:58
Behavioral task
behavioral1
Sample
ryomen-gen.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ryomen-gen.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ryomen-gen/config.json
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
ryomen-gen/config.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ryomen-gen/dcontrol/Defender_Settings.vbs
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
ryomen-gen/dcontrol/Defender_Settings.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ryomen-gen/dcontrol/dControl.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
ryomen-gen/dcontrol/dControl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
out.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
out.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ryomen-gen/dcontrol/dControl.ini
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
ryomen-gen/dcontrol/dControl.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ryomen-gen/read-me.txt
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
ryomen-gen/read-me.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ryomen-gen/ryomen.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
ryomen-gen/ryomen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ryomen.pyc
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
ryomen.pyc
Resource
win10v2004-20240802-en
General
-
Target
ryomen-gen/dcontrol/Defender_Settings.vbs
-
Size
313B
-
MD5
b0bf0a477bcca312021177572311e666
-
SHA1
ea77332d7779938ae8e92ad35d6dea4f4be37a92
-
SHA256
af42a17d428c8e9d6f4a6d3393ec268f4d12bbfd01a897d87275482a45c847e9
-
SHA512
09366608f2670d2eb0e8ddcacd081a7b2d7b680c4cdd02494d08821dbdf17595b30e88f6ce0888591592e7caa422414a895846a268fd63e8243074972c9f52d8
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2788 MSASCui.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2788 2396 WScript.exe 30 PID 2396 wrote to memory of 2788 2396 WScript.exe 30 PID 2396 wrote to memory of 2788 2396 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ryomen-gen\dcontrol\Defender_Settings.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files\Windows Defender\MSASCui.exe"C:\Program Files\Windows Defender\MSASCui.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2788
-