Analysis
-
max time kernel
23s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 10:31
Behavioral task
behavioral1
Sample
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe
Resource
win10v2004-20240802-en
General
-
Target
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe
-
Size
418KB
-
MD5
44c7d18633b5741db270a6bd378b6f3c
-
SHA1
c1d41db1662289870d9b0172c53612b8a346a0e3
-
SHA256
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595
-
SHA512
008befc95068a9b50a785aa84b9d2c446344cadf097241de658c9a810b4659a82e1a8edfc8c641b9237f2253d4980fe6b0a2c861b6c7883a82349815d9a34a3d
-
SSDEEP
6144:SOoLbiZZB2FpUJISUgJBJWR7UGRMFDLkSAGAR1LhT:cy9Z4R7iLBJAR1
Malware Config
Signatures
-
Detect Rhysida ransomware 3 IoCs
resource yara_rule behavioral1/memory/2380-1375-0x0000000000400000-0x0000000000478000-memory.dmp family_rhysida behavioral1/memory/2380-1376-0x0000000000400000-0x0000000000478000-memory.dmp family_rhysida behavioral1/memory/2380-1378-0x0000000000400000-0x0000000000478000-memory.dmp family_rhysida -
Rhysida
Rhysida is a ransomware that is written in C++ and discovered in 2023.
-
Renames multiple (686) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2860 powershell.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\CriticalBreachDetected.pdf 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Hide Artifacts: Hidden Window 1 TTPs 2 IoCs
Windows that would typically be displayed when an application carries out an operation can be hidden.
pid Process 2904 cmd.exe 2428 cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Public\\bg.jpg" reg.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 2904 cmd.exe 2428 cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2860 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2860 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2364 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 31 PID 2380 wrote to memory of 2364 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 31 PID 2380 wrote to memory of 2364 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 31 PID 2364 wrote to memory of 1140 2364 cmd.exe 33 PID 2364 wrote to memory of 1140 2364 cmd.exe 33 PID 2364 wrote to memory of 1140 2364 cmd.exe 33 PID 1140 wrote to memory of 1728 1140 cmd.exe 34 PID 1140 wrote to memory of 1728 1140 cmd.exe 34 PID 1140 wrote to memory of 1728 1140 cmd.exe 34 PID 2380 wrote to memory of 1740 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 35 PID 2380 wrote to memory of 1740 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 35 PID 2380 wrote to memory of 1740 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 35 PID 1740 wrote to memory of 1428 1740 cmd.exe 37 PID 1740 wrote to memory of 1428 1740 cmd.exe 37 PID 1740 wrote to memory of 1428 1740 cmd.exe 37 PID 1428 wrote to memory of 2060 1428 cmd.exe 38 PID 1428 wrote to memory of 2060 1428 cmd.exe 38 PID 1428 wrote to memory of 2060 1428 cmd.exe 38 PID 2380 wrote to memory of 2352 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 39 PID 2380 wrote to memory of 2352 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 39 PID 2380 wrote to memory of 2352 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 39 PID 2352 wrote to memory of 2672 2352 cmd.exe 41 PID 2352 wrote to memory of 2672 2352 cmd.exe 41 PID 2352 wrote to memory of 2672 2352 cmd.exe 41 PID 2672 wrote to memory of 2636 2672 cmd.exe 42 PID 2672 wrote to memory of 2636 2672 cmd.exe 42 PID 2672 wrote to memory of 2636 2672 cmd.exe 42 PID 2380 wrote to memory of 2320 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 43 PID 2380 wrote to memory of 2320 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 43 PID 2380 wrote to memory of 2320 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 43 PID 2320 wrote to memory of 1976 2320 cmd.exe 45 PID 2320 wrote to memory of 1976 2320 cmd.exe 45 PID 2320 wrote to memory of 1976 2320 cmd.exe 45 PID 1976 wrote to memory of 2500 1976 cmd.exe 46 PID 1976 wrote to memory of 2500 1976 cmd.exe 46 PID 1976 wrote to memory of 2500 1976 cmd.exe 46 PID 2380 wrote to memory of 2308 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 47 PID 2380 wrote to memory of 2308 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 47 PID 2380 wrote to memory of 2308 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 47 PID 2308 wrote to memory of 1996 2308 cmd.exe 49 PID 2308 wrote to memory of 1996 2308 cmd.exe 49 PID 2308 wrote to memory of 1996 2308 cmd.exe 49 PID 1996 wrote to memory of 1992 1996 cmd.exe 50 PID 1996 wrote to memory of 1992 1996 cmd.exe 50 PID 1996 wrote to memory of 1992 1996 cmd.exe 50 PID 2380 wrote to memory of 2012 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 51 PID 2380 wrote to memory of 2012 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 51 PID 2380 wrote to memory of 2012 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 51 PID 2012 wrote to memory of 640 2012 cmd.exe 53 PID 2012 wrote to memory of 640 2012 cmd.exe 53 PID 2012 wrote to memory of 640 2012 cmd.exe 53 PID 640 wrote to memory of 2276 640 cmd.exe 54 PID 640 wrote to memory of 2276 640 cmd.exe 54 PID 640 wrote to memory of 2276 640 cmd.exe 54 PID 2380 wrote to memory of 380 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 55 PID 2380 wrote to memory of 380 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 55 PID 2380 wrote to memory of 380 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 55 PID 380 wrote to memory of 1532 380 cmd.exe 57 PID 380 wrote to memory of 1532 380 cmd.exe 57 PID 380 wrote to memory of 1532 380 cmd.exe 57 PID 1532 wrote to memory of 2340 1532 cmd.exe 58 PID 1532 wrote to memory of 2340 1532 cmd.exe 58 PID 1532 wrote to memory of 2340 1532 cmd.exe 58 PID 2380 wrote to memory of 1600 2380 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe"C:\Users\Admin\AppData\Local\Temp\258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Contol Panel\Desktop" /v Wallpaper /f2⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Contol Panel\Desktop" /v Wallpaper /f3⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\reg.exereg delete "HKCU\Contol Panel\Desktop" /v Wallpaper /f4⤵PID:1728
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f3⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f4⤵PID:2060
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:2636
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:2500
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵
- Sets desktop wallpaper using registry
PID:1992
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵PID:2276
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:2340
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵PID:1600
-
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵PID:1588
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:2348
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe user32.dll,UpdatePerUserSystemParameters2⤵PID:2448
-
C:\Windows\system32\rundll32.exerundll32.exe user32.dll,UpdatePerUserSystemParameters3⤵PID:2912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe" -ErrorAction SilentlyContinue;2⤵
- Hide Artifacts: Hidden Window
- Hide Artifacts: Ignore Process Interrupts
PID:2904 -
C:\Windows\system32\cmd.execmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe" -ErrorAction SilentlyContinue;3⤵
- Hide Artifacts: Hidden Window
- Hide Artifacts: Ignore Process Interrupts
PID:2428 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe" -ErrorAction SilentlyContinue;4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Window
1Ignore Process Interrupts
1Indicator Removal
1File Deletion
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b0255953ca967ad08d514f93bcfaebd8
SHA11b19f60f698a9731f08e07f2f74fdb952adde675
SHA2567a00a9f4ffd1b2149deacecf85f2e8da93468f8448383352ef6713ba062e6cc5
SHA512def4f6824f46a973aa7f109a96e69517fdaab6abb2883f50fa6045a6e51b111b75be224185183127553dac2dbd1a39b6edaf67518b0bb6699880351705d86e87