Analysis
-
max time kernel
99s -
max time network
124s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
23-03-2021 15:24
Static task
static1
Behavioral task
behavioral1
Sample
xxx.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
xxx.exe
Resource
win10v20201028
General
-
Target
xxx.exe
-
Size
208KB
-
MD5
3c08d1e5233c623bfc854879173544de
-
SHA1
a1add1d1e80d84440fc013abcc754f1bdddf3a20
-
SHA256
956246824d2fb2f5f4738c450e8d222042b08c3e5c67c3ec755bedf641b7b1c5
-
SHA512
01adb468d0318f44532f5222fff6f06eb5128b6b368d2a939b0e5c54da592784e793f97a1a9617f908cf0b2b61c61253ec0157433faf3894cc34e63fbbc5a943
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://lgjpuim5fe3pejmllygcffape3djui6k2a5pcbpuyvps3h4ajb7yf4id.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 3 IoCs
pid Process 1612 ruHnFsqgXrep.exe 1828 rblIlnmlllan.exe 548 pmvGJPjuWlan.exe -
Loads dropped DLL 6 IoCs
pid Process 1636 xxx.exe 1636 xxx.exe 1636 xxx.exe 1636 xxx.exe 1636 xxx.exe 1636 xxx.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2660 icacls.exe 2672 icacls.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Karachi xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\mainscroll.png xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_videoinset.png xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\London xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\ct.sym xxx.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passportcover.png xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.servlet.jsp_2.2.0.v201112011158.jar xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\charsets.jar xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-next-static.png xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_ButtonGraphic.png xxx.exe File opened for modification C:\Program Files\Internet Explorer\en-US\iedvtool.dll.mui xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\default.jfc xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.xml xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\rtscom.dll.mui xxx.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-over-select.png xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Gibraltar xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\dt.jar xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC.DLL xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Vilnius xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.beans_1.2.200.v20140214-0004.jar xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\content-background.png xxx.exe File opened for modification C:\Program Files\Internet Explorer\en-US\F12Resources.dll.mui xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ho_Chi_Minh xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\ij.bat xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_ButtonGraphic.png xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\feature.properties xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\heart_glass_Thumbnail.bmp xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\sysinfo.bat xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\jaccess.jar xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Noronha xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Toronto xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\eclipse.inf xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg xxx.exe File opened for modification C:\Program Files\Internet Explorer\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.attributeTransformation.exsd xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\MANIFEST.MF xxx.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui xxx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\CircleSubpicture.png xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\RyukReadMe.html xxx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Aqtobe xxx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1636 xxx.exe 1636 xxx.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1612 1636 xxx.exe 29 PID 1636 wrote to memory of 1612 1636 xxx.exe 29 PID 1636 wrote to memory of 1612 1636 xxx.exe 29 PID 1636 wrote to memory of 1612 1636 xxx.exe 29 PID 1636 wrote to memory of 1828 1636 xxx.exe 30 PID 1636 wrote to memory of 1828 1636 xxx.exe 30 PID 1636 wrote to memory of 1828 1636 xxx.exe 30 PID 1636 wrote to memory of 1828 1636 xxx.exe 30 PID 1636 wrote to memory of 548 1636 xxx.exe 31 PID 1636 wrote to memory of 548 1636 xxx.exe 31 PID 1636 wrote to memory of 548 1636 xxx.exe 31 PID 1636 wrote to memory of 548 1636 xxx.exe 31 PID 1636 wrote to memory of 2660 1636 xxx.exe 32 PID 1636 wrote to memory of 2660 1636 xxx.exe 32 PID 1636 wrote to memory of 2660 1636 xxx.exe 32 PID 1636 wrote to memory of 2660 1636 xxx.exe 32 PID 1636 wrote to memory of 2672 1636 xxx.exe 33 PID 1636 wrote to memory of 2672 1636 xxx.exe 33 PID 1636 wrote to memory of 2672 1636 xxx.exe 33 PID 1636 wrote to memory of 2672 1636 xxx.exe 33 PID 1636 wrote to memory of 2004 1636 xxx.exe 37 PID 1636 wrote to memory of 2004 1636 xxx.exe 37 PID 1636 wrote to memory of 2004 1636 xxx.exe 37 PID 1636 wrote to memory of 2004 1636 xxx.exe 37 PID 2004 wrote to memory of 2772 2004 net.exe 39 PID 2004 wrote to memory of 2772 2004 net.exe 39 PID 2004 wrote to memory of 2772 2004 net.exe 39 PID 2004 wrote to memory of 2772 2004 net.exe 39 PID 1636 wrote to memory of 2936 1636 xxx.exe 40 PID 1636 wrote to memory of 2936 1636 xxx.exe 40 PID 1636 wrote to memory of 2936 1636 xxx.exe 40 PID 1636 wrote to memory of 2936 1636 xxx.exe 40 PID 1636 wrote to memory of 3004 1636 xxx.exe 41 PID 1636 wrote to memory of 3004 1636 xxx.exe 41 PID 1636 wrote to memory of 3004 1636 xxx.exe 41 PID 1636 wrote to memory of 3004 1636 xxx.exe 41 PID 3004 wrote to memory of 3036 3004 net.exe 45 PID 3004 wrote to memory of 3036 3004 net.exe 45 PID 3004 wrote to memory of 3036 3004 net.exe 45 PID 3004 wrote to memory of 3036 3004 net.exe 45 PID 2936 wrote to memory of 808 2936 net.exe 44 PID 2936 wrote to memory of 808 2936 net.exe 44 PID 2936 wrote to memory of 808 2936 net.exe 44 PID 2936 wrote to memory of 808 2936 net.exe 44 PID 1636 wrote to memory of 3056 1636 xxx.exe 46 PID 1636 wrote to memory of 3056 1636 xxx.exe 46 PID 1636 wrote to memory of 3056 1636 xxx.exe 46 PID 1636 wrote to memory of 3056 1636 xxx.exe 46 PID 3056 wrote to memory of 2836 3056 net.exe 48 PID 3056 wrote to memory of 2836 3056 net.exe 48 PID 3056 wrote to memory of 2836 3056 net.exe 48 PID 3056 wrote to memory of 2836 3056 net.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\xxx.exe"C:\Users\Admin\AppData\Local\Temp\xxx.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\ruHnFsqgXrep.exe"C:\Users\Admin\AppData\Local\Temp\ruHnFsqgXrep.exe" 9 REP2⤵
- Executes dropped EXE
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\rblIlnmlllan.exe"C:\Users\Admin\AppData\Local\Temp\rblIlnmlllan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\pmvGJPjuWlan.exe"C:\Users\Admin\AppData\Local\Temp\pmvGJPjuWlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:548
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2660
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2672
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2772
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:808
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:3036
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2836
-
-