Analysis

  • max time kernel
    112s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    07/03/2021, 22:11

General

  • Target

    rudZqlH.exe

  • Size

    254KB

  • MD5

    4540720d38ed99bceeb97161ca1ff401

  • SHA1

    5714dfd839db561ebcb3cccfcb6f0e39ef644f7b

  • SHA256

    4a87552c4238cdcf1b8611da467164e609da339ff897c50ad4d04aa105ec55bb

  • SHA512

    2be902451da4262ed9899ecd570e12f31516f4d937909ee8e99f2c5dfcdbd7a218cc4eda494357678067ccc58a674944d08150248707a96e7d64ff01b83f0dbf

Malware Config

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 25 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
    "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
    1⤵
      PID:3376
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:3900
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3624
        • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
          1⤵
            PID:3408
          • c:\windows\system32\taskhostw.exe
            taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
            1⤵
              PID:3036
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
              1⤵
                PID:2928
              • c:\windows\system32\sihost.exe
                sihost.exe
                1⤵
                  PID:2880
                • C:\Users\Admin\AppData\Local\Temp\rudZqlH.exe
                  "C:\Users\Admin\AppData\Local\Temp\rudZqlH.exe"
                  1⤵
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4684
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 908
                    2⤵
                    • Program crash
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3400
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 912
                    2⤵
                    • Program crash
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:524
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1000
                    2⤵
                    • Program crash
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:708
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1036
                    2⤵
                    • Program crash
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4172
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1044
                    2⤵
                    • Program crash
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3352
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1084
                    2⤵
                    • Program crash
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3220
                  • C:\Users\Admin\AppData\Local\Temp\oNHAJZT.exe
                    "C:\Users\Admin\AppData\Local\Temp\oNHAJZT.exe" 8 LAN
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4288
                    • C:\Windows\SysWOW64\icacls.exe
                      icacls "C:\*" /grant Everyone:F /T /C /Q
                      3⤵
                      • Modifies file permissions
                      PID:1868
                    • C:\Windows\SysWOW64\icacls.exe
                      icacls "D:\*" /grant Everyone:F /T /C /Q
                      3⤵
                      • Modifies file permissions
                      PID:2172
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c "WMIC.exe shadowcopy delet"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2264
                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                        WMIC.exe shadowcopy delet
                        4⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3144
                    • C:\Windows\SysWOW64\vssadmin.exe
                      vssadmin.exe Delete Shadows /all /quiet
                      3⤵
                      • Interacts with shadow copies
                      PID:4644
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 680
                      3⤵
                      • Program crash
                      • Suspicious use of AdjustPrivilegeToken
                      PID:212
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 672
                      3⤵
                      • Program crash
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3916
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 760
                      3⤵
                      • Program crash
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4520
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 836
                      3⤵
                      • Program crash
                      • Suspicious use of AdjustPrivilegeToken
                      PID:440
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 968
                      3⤵
                      • Program crash
                      PID:3296
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 1104
                      3⤵
                      • Program crash
                      PID:3984
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 1068
                      3⤵
                      • Program crash
                      PID:3552
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 1148
                      3⤵
                      • Program crash
                      PID:2136
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 1184
                      3⤵
                      • Program crash
                      PID:4416
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 1212
                      3⤵
                      • Program crash
                      PID:4320
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 1204
                      3⤵
                      • Suspicious use of NtCreateProcessExOtherParentProcess
                      • Program crash
                      PID:1672
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1252
                    2⤵
                    • Program crash
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4088
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1264
                    2⤵
                    • Program crash
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1772
                  • C:\Windows\SysWOW64\net.exe
                    "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4432
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                      3⤵
                        PID:4448
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1240
                      2⤵
                      • Program crash
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4500
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1128
                      2⤵
                      • Program crash
                      • Suspicious use of AdjustPrivilegeToken
                      PID:580
                    • C:\Windows\SysWOW64\net.exe
                      "C:\Windows\System32\net.exe" stop "samss" /y
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:884
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop "samss" /y
                        3⤵
                          PID:1228
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1204
                        2⤵
                        • Program crash
                        • Suspicious use of AdjustPrivilegeToken
                        PID:892
                      • C:\Windows\SysWOW64\icacls.exe
                        icacls "C:\*" /grant Everyone:F /T /C /Q
                        2⤵
                        • Modifies file permissions
                        PID:936
                      • C:\Windows\SysWOW64\icacls.exe
                        icacls "D:\*" /grant Everyone:F /T /C /Q
                        2⤵
                        • Modifies file permissions
                        PID:2588
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c "WMIC.exe shadowcopy delet"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1588
                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                          WMIC.exe shadowcopy delet
                          3⤵
                            PID:3524
                        • C:\Windows\SysWOW64\vssadmin.exe
                          vssadmin.exe Delete Shadows /all /quiet
                          2⤵
                          • Interacts with shadow copies
                          PID:1584
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\rudZqlH.exe" /f /reg:64
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1400
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\rudZqlH.exe" /f /reg:64
                            3⤵
                            • Adds Run key to start application
                            PID:3660
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1376
                          2⤵
                          • Program crash
                          PID:2076
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1868
                          2⤵
                          • Suspicious use of NtCreateProcessExOtherParentProcess
                          • Program crash
                          PID:5060
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1912
                          2⤵
                          • Program crash
                          PID:5064
                      • C:\Windows\system32\vssvc.exe
                        C:\Windows\system32\vssvc.exe
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2684

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/212-64-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                        Filesize

                        4KB

                      • memory/440-119-0x00000000043E0000-0x00000000043E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/524-8-0x0000000004990000-0x0000000004991000-memory.dmp

                        Filesize

                        4KB

                      • memory/524-11-0x0000000004990000-0x0000000004991000-memory.dmp

                        Filesize

                        4KB

                      • memory/580-47-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/708-12-0x0000000004760000-0x0000000004761000-memory.dmp

                        Filesize

                        4KB

                      • memory/892-51-0x0000000004D60000-0x0000000004D61000-memory.dmp

                        Filesize

                        4KB

                      • memory/1672-146-0x00000000047A0000-0x00000000047A1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1772-35-0x0000000005020000-0x0000000005021000-memory.dmp

                        Filesize

                        4KB

                      • memory/2076-155-0x0000000005020000-0x0000000005021000-memory.dmp

                        Filesize

                        4KB

                      • memory/2136-131-0x0000000004210000-0x0000000004211000-memory.dmp

                        Filesize

                        4KB

                      • memory/3220-23-0x0000000005020000-0x0000000005021000-memory.dmp

                        Filesize

                        4KB

                      • memory/3296-122-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3352-19-0x0000000004A30000-0x0000000004A31000-memory.dmp

                        Filesize

                        4KB

                      • memory/3400-3-0x0000000004670000-0x0000000004671000-memory.dmp

                        Filesize

                        4KB

                      • memory/3400-4-0x0000000004670000-0x0000000004671000-memory.dmp

                        Filesize

                        4KB

                      • memory/3552-128-0x00000000046A0000-0x00000000046A1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3916-69-0x00000000043B0000-0x00000000043B1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3984-125-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                        Filesize

                        4KB

                      • memory/4088-30-0x0000000004660000-0x0000000004661000-memory.dmp

                        Filesize

                        4KB

                      • memory/4172-15-0x0000000004680000-0x0000000004681000-memory.dmp

                        Filesize

                        4KB

                      • memory/4288-34-0x0000000002080000-0x0000000002081000-memory.dmp

                        Filesize

                        4KB

                      • memory/4288-72-0x0000000002410000-0x0000000002411000-memory.dmp

                        Filesize

                        4KB

                      • memory/4288-73-0x0000000002C10000-0x0000000002C11000-memory.dmp

                        Filesize

                        4KB

                      • memory/4320-143-0x0000000004F20000-0x0000000004F21000-memory.dmp

                        Filesize

                        4KB

                      • memory/4320-144-0x0000000004F20000-0x0000000004F21000-memory.dmp

                        Filesize

                        4KB

                      • memory/4320-140-0x0000000004B20000-0x0000000004B21000-memory.dmp

                        Filesize

                        4KB

                      • memory/4416-135-0x0000000004CC0000-0x0000000004CC1000-memory.dmp

                        Filesize

                        4KB

                      • memory/4500-40-0x0000000004A00000-0x0000000004A01000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-80-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-96-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-74-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-117-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-116-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-115-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-114-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-113-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-112-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-109-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-111-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-110-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-108-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-107-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-105-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-106-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-104-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-103-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-102-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-101-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-100-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-99-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-98-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-77-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-97-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-95-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-94-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-93-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-90-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-92-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-91-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-89-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-88-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-87-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-86-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-85-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-84-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-83-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-81-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-82-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-78-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4520-79-0x0000000004450000-0x0000000004451000-memory.dmp

                        Filesize

                        4KB

                      • memory/4684-2-0x0000000002140000-0x0000000002141000-memory.dmp

                        Filesize

                        4KB

                      • memory/4684-7-0x0000000030000000-0x0000000030170000-memory.dmp

                        Filesize

                        1.4MB

                      • memory/4684-6-0x0000000002010000-0x0000000002042000-memory.dmp

                        Filesize

                        200KB

                      • memory/5060-169-0x0000000004950000-0x0000000004951000-memory.dmp

                        Filesize

                        4KB

                      • memory/5064-166-0x00000000048B0000-0x00000000048B1000-memory.dmp

                        Filesize

                        4KB