Analysis
-
max time kernel
104s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 13:48
Behavioral task
behavioral1
Sample
67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe
Resource
win10v2004-20250410-en
General
-
Target
67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe
-
Size
1.2MB
-
MD5
67edfff8250487d97f403c74fed85388
-
SHA1
f20bc8af34dd292e017caf4d42dd95d0cdc08792
-
SHA256
67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5
-
SHA512
6d6e7ac43b04a1e129fb4a2b9dd2427745a0af32eb02ec4f8a612567356ac2e7e54977ede134b9650da4b5159ab28fb6decb067bd8889253d8fe04343ab52797
-
SSDEEP
24576:utP7hdO1s6Skscec1SgnyN9HPFCCNhQI6GOfaFVIVrYwcMavDiZn3m75/J7:gLO1qkscec0gnyN9HPFCCNSI6GOfaFVp
Malware Config
Signatures
-
Detect Rhysida ransomware 4 IoCs
resource yara_rule behavioral1/memory/1140-1195-0x0000000000400000-0x0000000000522000-memory.dmp family_rhysida behavioral1/memory/1140-1221-0x0000000000400000-0x0000000000522000-memory.dmp family_rhysida behavioral1/memory/1140-1222-0x0000000000400000-0x0000000000522000-memory.dmp family_rhysida behavioral1/memory/1140-1223-0x0000000000400000-0x0000000000522000-memory.dmp family_rhysida -
Rhysida
Rhysida is a ransomware that is written in C++ and discovered in 2023.
-
Rhysida family
-
Renames multiple (2524) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 5668 powershell.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Hide Artifacts: Hidden Window 1 TTPs 2 IoCs
Windows that would typically be displayed when an application carries out an operation can be hidden.
pid Process 4680 cmd.exe 4368 cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Public\\bg.jpg" reg.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 4680 cmd.exe 4368 cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5668 powershell.exe 5668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5668 powershell.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 1140 wrote to memory of 5540 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 96 PID 1140 wrote to memory of 5540 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 96 PID 5540 wrote to memory of 2228 5540 cmd.exe 97 PID 5540 wrote to memory of 2228 5540 cmd.exe 97 PID 2228 wrote to memory of 4128 2228 cmd.exe 98 PID 2228 wrote to memory of 4128 2228 cmd.exe 98 PID 1140 wrote to memory of 1112 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 99 PID 1140 wrote to memory of 1112 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 99 PID 1112 wrote to memory of 5280 1112 cmd.exe 100 PID 1112 wrote to memory of 5280 1112 cmd.exe 100 PID 5280 wrote to memory of 4812 5280 cmd.exe 101 PID 5280 wrote to memory of 4812 5280 cmd.exe 101 PID 1140 wrote to memory of 4828 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 102 PID 1140 wrote to memory of 4828 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 102 PID 4828 wrote to memory of 4584 4828 cmd.exe 103 PID 4828 wrote to memory of 4584 4828 cmd.exe 103 PID 4584 wrote to memory of 4444 4584 cmd.exe 104 PID 4584 wrote to memory of 4444 4584 cmd.exe 104 PID 1140 wrote to memory of 4460 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 105 PID 1140 wrote to memory of 4460 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 105 PID 4460 wrote to memory of 4428 4460 cmd.exe 106 PID 4460 wrote to memory of 4428 4460 cmd.exe 106 PID 4428 wrote to memory of 4464 4428 cmd.exe 107 PID 4428 wrote to memory of 4464 4428 cmd.exe 107 PID 1140 wrote to memory of 4596 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 108 PID 1140 wrote to memory of 4596 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 108 PID 4596 wrote to memory of 4612 4596 cmd.exe 109 PID 4596 wrote to memory of 4612 4596 cmd.exe 109 PID 4612 wrote to memory of 4628 4612 cmd.exe 110 PID 4612 wrote to memory of 4628 4612 cmd.exe 110 PID 1140 wrote to memory of 4188 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 111 PID 1140 wrote to memory of 4188 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 111 PID 4188 wrote to memory of 5524 4188 cmd.exe 112 PID 4188 wrote to memory of 5524 4188 cmd.exe 112 PID 5524 wrote to memory of 4360 5524 cmd.exe 113 PID 5524 wrote to memory of 4360 5524 cmd.exe 113 PID 1140 wrote to memory of 1576 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 114 PID 1140 wrote to memory of 1576 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 114 PID 1576 wrote to memory of 5584 1576 cmd.exe 115 PID 1576 wrote to memory of 5584 1576 cmd.exe 115 PID 5584 wrote to memory of 4616 5584 cmd.exe 116 PID 5584 wrote to memory of 4616 5584 cmd.exe 116 PID 1140 wrote to memory of 5808 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 117 PID 1140 wrote to memory of 5808 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 117 PID 5808 wrote to memory of 4344 5808 cmd.exe 118 PID 5808 wrote to memory of 4344 5808 cmd.exe 118 PID 4344 wrote to memory of 5288 4344 cmd.exe 119 PID 4344 wrote to memory of 5288 4344 cmd.exe 119 PID 1140 wrote to memory of 4500 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 120 PID 1140 wrote to memory of 4500 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 120 PID 4500 wrote to memory of 1588 4500 cmd.exe 121 PID 4500 wrote to memory of 1588 4500 cmd.exe 121 PID 1140 wrote to memory of 4680 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 122 PID 1140 wrote to memory of 4680 1140 67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe 122 PID 4680 wrote to memory of 4368 4680 cmd.exe 123 PID 4680 wrote to memory of 4368 4680 cmd.exe 123 PID 4368 wrote to memory of 5668 4368 cmd.exe 124 PID 4368 wrote to memory of 5668 4368 cmd.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe"C:\Users\Admin\AppData\Local\Temp\67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f2⤵
- Suspicious use of WriteProcessMemory
PID:5540 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f3⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f4⤵PID:4128
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f2⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f3⤵
- Suspicious use of WriteProcessMemory
PID:5280 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f4⤵PID:4812
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:4444
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:4464
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵
- Sets desktop wallpaper using registry
PID:4628
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:5524 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵PID:4360
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:5584 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:4616
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:5808 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:5288
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe user32.dll,UpdatePerUserSystemParameters2⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\system32\rundll32.exerundll32.exe user32.dll,UpdatePerUserSystemParameters3⤵PID:1588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe" -ErrorAction SilentlyContinue;2⤵
- Hide Artifacts: Hidden Window
- Hide Artifacts: Ignore Process Interrupts
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\system32\cmd.execmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe" -ErrorAction SilentlyContinue;3⤵
- Hide Artifacts: Hidden Window
- Hide Artifacts: Ignore Process Interrupts
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\67a78b39e760e3460a135a7e4fa096ab6ce6b013658103890c866d9401928ba5.exe" -ErrorAction SilentlyContinue;4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5668
-
-
-
Network
MITRE ATT&CK Enterprise v16
Defense Evasion
Hide Artifacts
2Hidden Window
1Ignore Process Interrupts
1Indicator Removal
1File Deletion
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82