Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 09:31
Behavioral task
behavioral1
Sample
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe
Resource
win10v2004-20240802-en
General
-
Target
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe
-
Size
418KB
-
MD5
44c7d18633b5741db270a6bd378b6f3c
-
SHA1
c1d41db1662289870d9b0172c53612b8a346a0e3
-
SHA256
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595
-
SHA512
008befc95068a9b50a785aa84b9d2c446344cadf097241de658c9a810b4659a82e1a8edfc8c641b9237f2253d4980fe6b0a2c861b6c7883a82349815d9a34a3d
-
SSDEEP
6144:SOoLbiZZB2FpUJISUgJBJWR7UGRMFDLkSAGAR1LhT:cy9Z4R7iLBJAR1
Malware Config
Signatures
-
Detect Rhysida ransomware 3 IoCs
resource yara_rule behavioral1/memory/2536-1425-0x0000000000400000-0x0000000000478000-memory.dmp family_rhysida behavioral1/memory/2536-1426-0x0000000000400000-0x0000000000478000-memory.dmp family_rhysida behavioral1/memory/2536-1429-0x0000000000400000-0x0000000000478000-memory.dmp family_rhysida -
Rhysida
Rhysida is a ransomware that is written in C++ and discovered in 2023.
-
Renames multiple (731) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\CriticalBreachDetected.pdf 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Public\\bg.jpg" reg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2248 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 32 PID 2536 wrote to memory of 2248 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 32 PID 2536 wrote to memory of 2248 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 32 PID 2248 wrote to memory of 1768 2248 cmd.exe 34 PID 2248 wrote to memory of 1768 2248 cmd.exe 34 PID 2248 wrote to memory of 1768 2248 cmd.exe 34 PID 1768 wrote to memory of 1944 1768 cmd.exe 35 PID 1768 wrote to memory of 1944 1768 cmd.exe 35 PID 1768 wrote to memory of 1944 1768 cmd.exe 35 PID 2536 wrote to memory of 1824 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 36 PID 2536 wrote to memory of 1824 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 36 PID 2536 wrote to memory of 1824 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 36 PID 1824 wrote to memory of 2560 1824 cmd.exe 38 PID 1824 wrote to memory of 2560 1824 cmd.exe 38 PID 1824 wrote to memory of 2560 1824 cmd.exe 38 PID 2560 wrote to memory of 2524 2560 cmd.exe 39 PID 2560 wrote to memory of 2524 2560 cmd.exe 39 PID 2560 wrote to memory of 2524 2560 cmd.exe 39 PID 2536 wrote to memory of 2068 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 40 PID 2536 wrote to memory of 2068 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 40 PID 2536 wrote to memory of 2068 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 40 PID 2068 wrote to memory of 2692 2068 cmd.exe 42 PID 2068 wrote to memory of 2692 2068 cmd.exe 42 PID 2068 wrote to memory of 2692 2068 cmd.exe 42 PID 2692 wrote to memory of 2404 2692 cmd.exe 43 PID 2692 wrote to memory of 2404 2692 cmd.exe 43 PID 2692 wrote to memory of 2404 2692 cmd.exe 43 PID 2536 wrote to memory of 1788 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 44 PID 2536 wrote to memory of 1788 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 44 PID 2536 wrote to memory of 1788 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 44 PID 1788 wrote to memory of 2384 1788 cmd.exe 46 PID 1788 wrote to memory of 2384 1788 cmd.exe 46 PID 1788 wrote to memory of 2384 1788 cmd.exe 46 PID 2384 wrote to memory of 1680 2384 cmd.exe 47 PID 2384 wrote to memory of 1680 2384 cmd.exe 47 PID 2384 wrote to memory of 1680 2384 cmd.exe 47 PID 2536 wrote to memory of 2064 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 48 PID 2536 wrote to memory of 2064 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 48 PID 2536 wrote to memory of 2064 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 48 PID 2064 wrote to memory of 1576 2064 cmd.exe 50 PID 2064 wrote to memory of 1576 2064 cmd.exe 50 PID 2064 wrote to memory of 1576 2064 cmd.exe 50 PID 1576 wrote to memory of 1588 1576 cmd.exe 51 PID 1576 wrote to memory of 1588 1576 cmd.exe 51 PID 1576 wrote to memory of 1588 1576 cmd.exe 51 PID 2536 wrote to memory of 1684 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 52 PID 2536 wrote to memory of 1684 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 52 PID 2536 wrote to memory of 1684 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 52 PID 1684 wrote to memory of 2232 1684 cmd.exe 54 PID 1684 wrote to memory of 2232 1684 cmd.exe 54 PID 1684 wrote to memory of 2232 1684 cmd.exe 54 PID 2232 wrote to memory of 1580 2232 cmd.exe 55 PID 2232 wrote to memory of 1580 2232 cmd.exe 55 PID 2232 wrote to memory of 1580 2232 cmd.exe 55 PID 2536 wrote to memory of 588 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 56 PID 2536 wrote to memory of 588 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 56 PID 2536 wrote to memory of 588 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 56 PID 588 wrote to memory of 2740 588 cmd.exe 58 PID 588 wrote to memory of 2740 588 cmd.exe 58 PID 588 wrote to memory of 2740 588 cmd.exe 58 PID 2740 wrote to memory of 2760 2740 cmd.exe 59 PID 2740 wrote to memory of 2760 2740 cmd.exe 59 PID 2740 wrote to memory of 2760 2740 cmd.exe 59 PID 2536 wrote to memory of 2716 2536 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe"C:\Users\Admin\AppData\Local\Temp\258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Contol Panel\Desktop" /v Wallpaper /f2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Contol Panel\Desktop" /v Wallpaper /f3⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\reg.exereg delete "HKCU\Contol Panel\Desktop" /v Wallpaper /f4⤵PID:1944
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f3⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f4⤵PID:2524
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:2404
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:1680
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵
- Sets desktop wallpaper using registry
PID:1588
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵PID:1580
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:2760
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵PID:2716
-
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵PID:2824
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:2764
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe user32.dll,UpdatePerUserSystemParameters2⤵PID:2872
-
C:\Windows\system32\rundll32.exerundll32.exe user32.dll,UpdatePerUserSystemParameters3⤵PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b0255953ca967ad08d514f93bcfaebd8
SHA11b19f60f698a9731f08e07f2f74fdb952adde675
SHA2567a00a9f4ffd1b2149deacecf85f2e8da93468f8448383352ef6713ba062e6cc5
SHA512def4f6824f46a973aa7f109a96e69517fdaab6abb2883f50fa6045a6e51b111b75be224185183127553dac2dbd1a39b6edaf67518b0bb6699880351705d86e87
-
Filesize
384KB
MD559a2a703a7cbfd58e19ec195bd92927e
SHA1df95e24d94c13c6798aa743432d0c3f11033d4fa
SHA25631f038578a298dfc641ba0c33f52c994de6a207ca48292b42ed0a4cac4fbe66e
SHA5123185767b8997e8af7215cd6c6d25739bd0c4f3b853e0c86f4235adf5ef7e02e13a92210d5fa3918a8e70b750388c2af25331f05f5c05e66334ce62532e031c3e