Overview
overview
10Static
static
80323b4326b...02.exe
windows7_x64
100323b4326b...02.exe
windows10_x64
100898a80dc2...92.exe
windows7_x64
100898a80dc2...92.exe
windows10_x64
100aaecf7f77...91.exe
windows7_x64
100aaecf7f77...91.exe
windows10_x64
10150e8ef3f1...02.exe
windows7_x64
10150e8ef3f1...02.exe
windows10_x64
1023e95ba676...7f.exe
windows7_x64
1023e95ba676...7f.exe
windows10_x64
1028e7dc4aeb...33.exe
windows7_x64
28e7dc4aeb...33.exe
windows10_x64
10350b0d6ae2...d7.exe
windows7_x64
1350b0d6ae2...d7.exe
windows10_x64
13a6ebac4f8...ca.exe
windows7_x64
103a6ebac4f8...ca.exe
windows10_x64
103fe801df14...4f.exe
windows7_x64
83fe801df14...4f.exe
windows10_x64
841367ad447...00.exe
windows7_x64
1041367ad447...00.exe
windows10_x64
1048f4749f13...77.exe
windows7_x64
148f4749f13...77.exe
windows10_x64
1499d936c22...82.exe
windows7_x64
10499d936c22...82.exe
windows10_x64
104b5a6926ab...d1.exe
windows7_x64
14b5a6926ab...d1.exe
windows10_x64
14bb0d8eb6b...81.exe
windows7_x64
104bb0d8eb6b...81.exe
windows10_x64
105de3d5a337...ed.exe
windows7_x64
105de3d5a337...ed.exe
windows10_x64
105e2b2fe65d...20.exe
windows7_x64
15e2b2fe65d...20.exe
windows10_x64
3Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
30-03-2021 11:28
Behavioral task
behavioral1
Sample
0323b4326bd6674f7d78360bb6544c4b34067066dda31e45edee91dec021e702.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0323b4326bd6674f7d78360bb6544c4b34067066dda31e45edee91dec021e702.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
0898a80dc248a7931f8e2bf76a22a0a8d54b39a815e3fe810a2a190c50017892.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
0898a80dc248a7931f8e2bf76a22a0a8d54b39a815e3fe810a2a190c50017892.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
0aaecf7f77132def96c13d480e32d759839fd65fa76c73e29f0f53c50714c591.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
0aaecf7f77132def96c13d480e32d759839fd65fa76c73e29f0f53c50714c591.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
150e8ef3f1b0d5b5b2af2ffc8d540cb0e36ecdcaf5001bab2f318e36a3c25302.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
150e8ef3f1b0d5b5b2af2ffc8d540cb0e36ecdcaf5001bab2f318e36a3c25302.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
23e95ba67603234352ff2864dc7fa54742f501e5922f01f8c182dbefc116f97f.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
23e95ba67603234352ff2864dc7fa54742f501e5922f01f8c182dbefc116f97f.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
28e7dc4aebbfea61a2ad942f00ecab3bbb32a636679587a6fbd6c8dd69a0ef33.exe
Resource
win7v20201028
Behavioral task
behavioral12
Sample
28e7dc4aebbfea61a2ad942f00ecab3bbb32a636679587a6fbd6c8dd69a0ef33.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
350b0d6ae25e81c8394b119f4d569c083df8d17e6241d8efed0858cf91c745d7.exe
Resource
win7v20201028
Behavioral task
behavioral14
Sample
350b0d6ae25e81c8394b119f4d569c083df8d17e6241d8efed0858cf91c745d7.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca.exe
Resource
win7v20201028
Behavioral task
behavioral16
Sample
3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca.exe
Resource
win10v20201028
Behavioral task
behavioral17
Sample
3fe801df149ffae08275e24be6bce3de67e9d5407c0417542001f726541fbe4f.exe
Resource
win7v20201028
Behavioral task
behavioral18
Sample
3fe801df149ffae08275e24be6bce3de67e9d5407c0417542001f726541fbe4f.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
41367ad447e3d86176713af7776c1ab22d5fc7fd0fe9584f14d201b9bf071700.exe
Resource
win7v20201028
Behavioral task
behavioral20
Sample
41367ad447e3d86176713af7776c1ab22d5fc7fd0fe9584f14d201b9bf071700.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
48f4749f13582fea3e9bcc6775cce82c3c6391d2d58acd98b99d1e6acc810277.exe
Resource
win7v20201028
Behavioral task
behavioral22
Sample
48f4749f13582fea3e9bcc6775cce82c3c6391d2d58acd98b99d1e6acc810277.exe
Resource
win10v20201028
Behavioral task
behavioral23
Sample
499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe
Resource
win7v20201028
Behavioral task
behavioral24
Sample
499d936c223743c3d2a40c3b7b1f974cedb98951f846b163d0f17d2d38ffc282.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
4b5a6926ab9b487fca2d33ba00b4e25f731bc52a3222a6ef3141b8703c1e2cd1.exe
Resource
win7v20201028
Behavioral task
behavioral26
Sample
4b5a6926ab9b487fca2d33ba00b4e25f731bc52a3222a6ef3141b8703c1e2cd1.exe
Resource
win10v20201028
Behavioral task
behavioral27
Sample
4bb0d8eb6b93060941730c65ac5c11625b805f91616841cdfb887d8461aef581.exe
Resource
win7v20201028
Behavioral task
behavioral28
Sample
4bb0d8eb6b93060941730c65ac5c11625b805f91616841cdfb887d8461aef581.exe
Resource
win10v20201028
Behavioral task
behavioral29
Sample
5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe
Resource
win7v20201028
Behavioral task
behavioral30
Sample
5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe
Resource
win10v20201028
Behavioral task
behavioral31
Sample
5e2b2fe65df310fe6c81acb628701c1847e772f7cf49aaa486e298a86ae85620.exe
Resource
win7v20201028
Behavioral task
behavioral32
Sample
5e2b2fe65df310fe6c81acb628701c1847e772f7cf49aaa486e298a86ae85620.exe
Resource
win10v20201028
General
-
Target
5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe
-
Size
140KB
-
MD5
75a3cf8ced873ee7bc415e27e108496b
-
SHA1
ac94165d63c75f4adf1728aa2ecb776ac7c1c18e
-
SHA256
5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed
-
SHA512
7c3e166ff75ad32f70bfb355167333be4f9bc5b5740a231b4a1fb5c391bd8e137ebea6a3ba5370797f016cbdb83631bb5e459e0bc64beb3246ed9605b3bdb903
Malware Config
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
http://rk2zzyh63g5avvii4irkhymha3irblchdfj7prk6zwy23f6kahidkpqd.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 3 IoCs
pid Process 2752 cHxyBbAEorep.exe 992 bXmnBcHhglan.exe 1488 DjoFjvcpnlan.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3856 icacls.exe 3832 icacls.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\N: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\F: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\V: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\T: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\R: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\W: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\U: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\M: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\L: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\K: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\Z: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\Y: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\X: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\S: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\J: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\H: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\G: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\E: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\Q: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\P: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened (read-only) \??\I: 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jni.h 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaSansDemiBold.ttf 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\DESIGNER\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\msinfo32.exe.mui 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\th-TH\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jconsole.jar 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ServiceWatcherSchedule.xml 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\cursors.properties 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrenclm.dat 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.jpg 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setNetworkClientCP 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_de_DE.jar 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fontconfig.properties.src 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\IPSEventLogMsg.dll.mui 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Bears.htm 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derby.jar 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jawt.lib 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\System\ado\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaTypewriterRegular.ttf 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\micaut.dll.mui 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\amd64\jvm.cfg 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav.xml 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsrus.xml 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\FlickLearningWizard.exe.mui 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\psfont.properties.ja 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Internet Explorer\images\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.htm 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\javaws.policy 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\tipresx.dll.mui 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\SoftBlue.jpg 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\management-agent.jar 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\dtplugin\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\RyukReadMe.html 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\dt.jar 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsplk.xml 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Common Files\System\ado\msadox28.tlb 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fontconfig.bfc 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaTypewriterBold.ttf 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 744 wrote to memory of 2752 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 78 PID 744 wrote to memory of 2752 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 78 PID 744 wrote to memory of 2752 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 78 PID 744 wrote to memory of 992 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 79 PID 744 wrote to memory of 992 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 79 PID 744 wrote to memory of 992 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 79 PID 744 wrote to memory of 1488 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 80 PID 744 wrote to memory of 1488 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 80 PID 744 wrote to memory of 1488 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 80 PID 744 wrote to memory of 3856 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 81 PID 744 wrote to memory of 3856 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 81 PID 744 wrote to memory of 3856 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 81 PID 744 wrote to memory of 3832 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 82 PID 744 wrote to memory of 3832 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 82 PID 744 wrote to memory of 3832 744 5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe"C:\Users\Admin\AppData\Local\Temp\5de3d5a33745739259fc03cb5a7852440c135f960e8516d92181cd16ba76e2ed.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\cHxyBbAEorep.exe"C:\Users\Admin\AppData\Local\Temp\cHxyBbAEorep.exe" 9 REP2⤵
- Executes dropped EXE
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\bXmnBcHhglan.exe"C:\Users\Admin\AppData\Local\Temp\bXmnBcHhglan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\DjoFjvcpnlan.exe"C:\Users\Admin\AppData\Local\Temp\DjoFjvcpnlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:1488
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:3856
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:3832
-