Analysis
-
max time kernel
104s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 13:46
Behavioral task
behavioral1
Sample
0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe
Resource
win10v2004-20250410-en
General
-
Target
0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe
-
Size
419KB
-
MD5
26f41a46d0addde100bb9512a130de5e
-
SHA1
bef7719a8a98131b8bdf885895b5d1c3f9d089ad
-
SHA256
0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae
-
SHA512
99d09fe0f657d3c965429094ca1d077c4e1a5f066b0ae022dd6f344af6d8ebc9a5a559be2ab11019216e516688f5fa5daac15bae8d5d524bd665c56cfa07bd41
-
SSDEEP
6144:1OQ7bSLB+QbqZ0/xDPK8JLM7hsqMFUtkko1mJ8+ANqT:OmQx71M75tzOmJ8+
Malware Config
Signatures
-
Detect Rhysida ransomware 3 IoCs
resource yara_rule behavioral1/memory/184-1012-0x0000000000400000-0x0000000000477000-memory.dmp family_rhysida behavioral1/memory/184-1013-0x0000000000400000-0x0000000000477000-memory.dmp family_rhysida behavioral1/memory/184-1014-0x0000000000400000-0x0000000000477000-memory.dmp family_rhysida -
Rhysida
Rhysida is a ransomware that is written in C++ and discovered in 2023.
-
Rhysida family
-
Renames multiple (2503) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4608 powershell.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Hide Artifacts: Hidden Window 1 TTPs 2 IoCs
Windows that would typically be displayed when an application carries out an operation can be hidden.
pid Process 5328 cmd.exe 1960 cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Public\\bg.jpg" reg.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 5328 cmd.exe 1960 cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4608 powershell.exe 4608 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4608 powershell.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 184 wrote to memory of 5696 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 92 PID 184 wrote to memory of 5696 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 92 PID 5696 wrote to memory of 2672 5696 cmd.exe 94 PID 5696 wrote to memory of 2672 5696 cmd.exe 94 PID 2672 wrote to memory of 4220 2672 cmd.exe 95 PID 2672 wrote to memory of 4220 2672 cmd.exe 95 PID 184 wrote to memory of 2276 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 96 PID 184 wrote to memory of 2276 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 96 PID 2276 wrote to memory of 2348 2276 cmd.exe 98 PID 2276 wrote to memory of 2348 2276 cmd.exe 98 PID 2348 wrote to memory of 4080 2348 cmd.exe 99 PID 2348 wrote to memory of 4080 2348 cmd.exe 99 PID 184 wrote to memory of 3120 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 100 PID 184 wrote to memory of 3120 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 100 PID 3120 wrote to memory of 2856 3120 cmd.exe 102 PID 3120 wrote to memory of 2856 3120 cmd.exe 102 PID 2856 wrote to memory of 5864 2856 cmd.exe 103 PID 2856 wrote to memory of 5864 2856 cmd.exe 103 PID 184 wrote to memory of 3180 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 104 PID 184 wrote to memory of 3180 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 104 PID 3180 wrote to memory of 5516 3180 cmd.exe 106 PID 3180 wrote to memory of 5516 3180 cmd.exe 106 PID 5516 wrote to memory of 5348 5516 cmd.exe 107 PID 5516 wrote to memory of 5348 5516 cmd.exe 107 PID 184 wrote to memory of 4516 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 108 PID 184 wrote to memory of 4516 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 108 PID 4516 wrote to memory of 5676 4516 cmd.exe 110 PID 4516 wrote to memory of 5676 4516 cmd.exe 110 PID 5676 wrote to memory of 2772 5676 cmd.exe 111 PID 5676 wrote to memory of 2772 5676 cmd.exe 111 PID 184 wrote to memory of 2960 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 112 PID 184 wrote to memory of 2960 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 112 PID 2960 wrote to memory of 4016 2960 cmd.exe 114 PID 2960 wrote to memory of 4016 2960 cmd.exe 114 PID 4016 wrote to memory of 3928 4016 cmd.exe 115 PID 4016 wrote to memory of 3928 4016 cmd.exe 115 PID 184 wrote to memory of 1192 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 116 PID 184 wrote to memory of 1192 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 116 PID 1192 wrote to memory of 4948 1192 cmd.exe 118 PID 1192 wrote to memory of 4948 1192 cmd.exe 118 PID 4948 wrote to memory of 1908 4948 cmd.exe 119 PID 4948 wrote to memory of 1908 4948 cmd.exe 119 PID 184 wrote to memory of 4348 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 120 PID 184 wrote to memory of 4348 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 120 PID 4348 wrote to memory of 5880 4348 cmd.exe 122 PID 4348 wrote to memory of 5880 4348 cmd.exe 122 PID 5880 wrote to memory of 2948 5880 cmd.exe 123 PID 5880 wrote to memory of 2948 5880 cmd.exe 123 PID 184 wrote to memory of 4836 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 124 PID 184 wrote to memory of 4836 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 124 PID 4836 wrote to memory of 3112 4836 cmd.exe 126 PID 4836 wrote to memory of 3112 4836 cmd.exe 126 PID 184 wrote to memory of 5328 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 127 PID 184 wrote to memory of 5328 184 0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe 127 PID 5328 wrote to memory of 1960 5328 cmd.exe 129 PID 5328 wrote to memory of 1960 5328 cmd.exe 129 PID 1960 wrote to memory of 4608 1960 cmd.exe 130 PID 1960 wrote to memory of 4608 1960 cmd.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe"C:\Users\Admin\AppData\Local\Temp\0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f2⤵
- Suspicious use of WriteProcessMemory
PID:5696 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f3⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f4⤵PID:4220
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f2⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f3⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f4⤵PID:4080
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:5864
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:5516 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:5348
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:5676 -
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵
- Sets desktop wallpaper using registry
PID:2772
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵PID:3928
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:1908
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:5880 -
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:2948
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe user32.dll,UpdatePerUserSystemParameters2⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\system32\rundll32.exerundll32.exe user32.dll,UpdatePerUserSystemParameters3⤵PID:3112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe" -ErrorAction SilentlyContinue;2⤵
- Hide Artifacts: Hidden Window
- Hide Artifacts: Ignore Process Interrupts
- Suspicious use of WriteProcessMemory
PID:5328 -
C:\Windows\system32\cmd.execmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe" -ErrorAction SilentlyContinue;3⤵
- Hide Artifacts: Hidden Window
- Hide Artifacts: Ignore Process Interrupts
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae.exe" -ErrorAction SilentlyContinue;4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
-
Network
MITRE ATT&CK Enterprise v16
Defense Evasion
Hide Artifacts
2Hidden Window
1Ignore Process Interrupts
1Indicator Removal
1File Deletion
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82