Analysis
-
max time kernel
148s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
29-03-2021 05:10
Static task
static1
Behavioral task
behavioral1
Sample
xxx.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
xxx.exe
Resource
win10v20201028
General
-
Target
xxx.exe
-
Size
212KB
-
MD5
af9754aa7c14005973189c09494b50af
-
SHA1
fd4b1bdbbfc7fe46bfe3d2205641c441f796a03d
-
SHA256
30aa50598d3a153d842f3861f66cd1a8ee754f850ee2429aa739975536b5be3a
-
SHA512
c6fdd0b930e573d4b3d94232e2ca624c6d21bff572d237e6f3abd9d26ee0e6eb4db0e9bd1384a5961a5da6fc44d81026534a139696b3ae6688705fa52471f887
Malware Config
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
http://rk2zzyh63g5avvii4irkhymha3irblchdfj7prk6zwy23f6kahidkpqd.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 3 IoCs
pid Process 2680 zWrFCrSjTrep.exe 3844 egsmJFiiwlan.exe 3344 UDufVTXsnlan.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2068 icacls.exe 3744 icacls.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: xxx.exe File opened (read-only) \??\U: xxx.exe File opened (read-only) \??\R: xxx.exe File opened (read-only) \??\O: xxx.exe File opened (read-only) \??\N: xxx.exe File opened (read-only) \??\Q: xxx.exe File opened (read-only) \??\M: xxx.exe File opened (read-only) \??\L: xxx.exe File opened (read-only) \??\G: xxx.exe File opened (read-only) \??\F: xxx.exe File opened (read-only) \??\H: xxx.exe File opened (read-only) \??\Z: xxx.exe File opened (read-only) \??\Y: xxx.exe File opened (read-only) \??\W: xxx.exe File opened (read-only) \??\T: xxx.exe File opened (read-only) \??\P: xxx.exe File opened (read-only) \??\K: xxx.exe File opened (read-only) \??\I: xxx.exe File opened (read-only) \??\E: xxx.exe File opened (read-only) \??\V: xxx.exe File opened (read-only) \??\S: xxx.exe File opened (read-only) \??\J: xxx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4048 xxx.exe 4048 xxx.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4048 wrote to memory of 2680 4048 xxx.exe 78 PID 4048 wrote to memory of 2680 4048 xxx.exe 78 PID 4048 wrote to memory of 2680 4048 xxx.exe 78 PID 4048 wrote to memory of 3844 4048 xxx.exe 79 PID 4048 wrote to memory of 3844 4048 xxx.exe 79 PID 4048 wrote to memory of 3844 4048 xxx.exe 79 PID 4048 wrote to memory of 3344 4048 xxx.exe 80 PID 4048 wrote to memory of 3344 4048 xxx.exe 80 PID 4048 wrote to memory of 3344 4048 xxx.exe 80 PID 4048 wrote to memory of 2068 4048 xxx.exe 81 PID 4048 wrote to memory of 2068 4048 xxx.exe 81 PID 4048 wrote to memory of 2068 4048 xxx.exe 81 PID 4048 wrote to memory of 3744 4048 xxx.exe 82 PID 4048 wrote to memory of 3744 4048 xxx.exe 82 PID 4048 wrote to memory of 3744 4048 xxx.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\xxx.exe"C:\Users\Admin\AppData\Local\Temp\xxx.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\zWrFCrSjTrep.exe"C:\Users\Admin\AppData\Local\Temp\zWrFCrSjTrep.exe" 9 REP2⤵
- Executes dropped EXE
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\egsmJFiiwlan.exe"C:\Users\Admin\AppData\Local\Temp\egsmJFiiwlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\UDufVTXsnlan.exe"C:\Users\Admin\AppData\Local\Temp\UDufVTXsnlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:3344
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2068
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:3744
-