Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 01:13
Behavioral task
behavioral1
Sample
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe
Resource
win10v2004-20240802-en
General
-
Target
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe
-
Size
418KB
-
MD5
44c7d18633b5741db270a6bd378b6f3c
-
SHA1
c1d41db1662289870d9b0172c53612b8a346a0e3
-
SHA256
258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595
-
SHA512
008befc95068a9b50a785aa84b9d2c446344cadf097241de658c9a810b4659a82e1a8edfc8c641b9237f2253d4980fe6b0a2c861b6c7883a82349815d9a34a3d
-
SSDEEP
6144:SOoLbiZZB2FpUJISUgJBJWR7UGRMFDLkSAGAR1LhT:cy9Z4R7iLBJAR1
Malware Config
Signatures
-
Detect Rhysida ransomware 3 IoCs
resource yara_rule behavioral1/memory/2080-1379-0x0000000000400000-0x0000000000478000-memory.dmp family_rhysida behavioral1/memory/2080-1380-0x0000000000400000-0x0000000000478000-memory.dmp family_rhysida behavioral1/memory/2080-1382-0x0000000000400000-0x0000000000478000-memory.dmp family_rhysida -
Rhysida
Rhysida is a ransomware that is written in C++ and discovered in 2023.
-
Renames multiple (692) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Public\\bg.jpg" reg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1608 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 29 PID 2080 wrote to memory of 1608 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 29 PID 2080 wrote to memory of 1608 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 29 PID 1608 wrote to memory of 844 1608 cmd.exe 31 PID 1608 wrote to memory of 844 1608 cmd.exe 31 PID 1608 wrote to memory of 844 1608 cmd.exe 31 PID 844 wrote to memory of 696 844 cmd.exe 32 PID 844 wrote to memory of 696 844 cmd.exe 32 PID 844 wrote to memory of 696 844 cmd.exe 32 PID 2080 wrote to memory of 2336 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 33 PID 2080 wrote to memory of 2336 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 33 PID 2080 wrote to memory of 2336 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 33 PID 2336 wrote to memory of 1468 2336 cmd.exe 35 PID 2336 wrote to memory of 1468 2336 cmd.exe 35 PID 2336 wrote to memory of 1468 2336 cmd.exe 35 PID 1468 wrote to memory of 1136 1468 cmd.exe 36 PID 1468 wrote to memory of 1136 1468 cmd.exe 36 PID 1468 wrote to memory of 1136 1468 cmd.exe 36 PID 2080 wrote to memory of 1248 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 37 PID 2080 wrote to memory of 1248 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 37 PID 2080 wrote to memory of 1248 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 37 PID 1248 wrote to memory of 2220 1248 cmd.exe 39 PID 1248 wrote to memory of 2220 1248 cmd.exe 39 PID 1248 wrote to memory of 2220 1248 cmd.exe 39 PID 2220 wrote to memory of 2880 2220 cmd.exe 40 PID 2220 wrote to memory of 2880 2220 cmd.exe 40 PID 2220 wrote to memory of 2880 2220 cmd.exe 40 PID 2080 wrote to memory of 444 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 41 PID 2080 wrote to memory of 444 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 41 PID 2080 wrote to memory of 444 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 41 PID 444 wrote to memory of 2160 444 cmd.exe 43 PID 444 wrote to memory of 2160 444 cmd.exe 43 PID 444 wrote to memory of 2160 444 cmd.exe 43 PID 2160 wrote to memory of 2164 2160 cmd.exe 44 PID 2160 wrote to memory of 2164 2160 cmd.exe 44 PID 2160 wrote to memory of 2164 2160 cmd.exe 44 PID 2080 wrote to memory of 2300 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 45 PID 2080 wrote to memory of 2300 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 45 PID 2080 wrote to memory of 2300 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 45 PID 2300 wrote to memory of 1344 2300 cmd.exe 47 PID 2300 wrote to memory of 1344 2300 cmd.exe 47 PID 2300 wrote to memory of 1344 2300 cmd.exe 47 PID 1344 wrote to memory of 2308 1344 cmd.exe 48 PID 1344 wrote to memory of 2308 1344 cmd.exe 48 PID 1344 wrote to memory of 2308 1344 cmd.exe 48 PID 2080 wrote to memory of 704 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 49 PID 2080 wrote to memory of 704 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 49 PID 2080 wrote to memory of 704 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 49 PID 704 wrote to memory of 1288 704 cmd.exe 51 PID 704 wrote to memory of 1288 704 cmd.exe 51 PID 704 wrote to memory of 1288 704 cmd.exe 51 PID 1288 wrote to memory of 1544 1288 cmd.exe 52 PID 1288 wrote to memory of 1544 1288 cmd.exe 52 PID 1288 wrote to memory of 1544 1288 cmd.exe 52 PID 2080 wrote to memory of 976 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 53 PID 2080 wrote to memory of 976 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 53 PID 2080 wrote to memory of 976 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 53 PID 976 wrote to memory of 932 976 cmd.exe 55 PID 976 wrote to memory of 932 976 cmd.exe 55 PID 976 wrote to memory of 932 976 cmd.exe 55 PID 932 wrote to memory of 1360 932 cmd.exe 56 PID 932 wrote to memory of 1360 932 cmd.exe 56 PID 932 wrote to memory of 1360 932 cmd.exe 56 PID 2080 wrote to memory of 1700 2080 258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe"C:\Users\Admin\AppData\Local\Temp\258ddd78655ac0587f64d7146e52549115b67465302c0cbd15a0cba746f05595.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Contol Panel\Desktop" /v Wallpaper /f2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Contol Panel\Desktop" /v Wallpaper /f3⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\system32\reg.exereg delete "HKCU\Contol Panel\Desktop" /v Wallpaper /f4⤵PID:696
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f3⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f4⤵PID:1136
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:2880
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:2164
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵
- Sets desktop wallpaper using registry
PID:2308
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵PID:1544
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:1360
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵PID:1700
-
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵PID:2152
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:964
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe user32.dll,UpdatePerUserSystemParameters2⤵PID:1936
-
C:\Windows\system32\rundll32.exerundll32.exe user32.dll,UpdatePerUserSystemParameters3⤵PID:788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b0255953ca967ad08d514f93bcfaebd8
SHA11b19f60f698a9731f08e07f2f74fdb952adde675
SHA2567a00a9f4ffd1b2149deacecf85f2e8da93468f8448383352ef6713ba062e6cc5
SHA512def4f6824f46a973aa7f109a96e69517fdaab6abb2883f50fa6045a6e51b111b75be224185183127553dac2dbd1a39b6edaf67518b0bb6699880351705d86e87