Analysis
-
max time kernel
101s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-04-2021 14:10
Static task
static1
Behavioral task
behavioral1
Sample
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe
Resource
win10v20201028
General
-
Target
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe
-
Size
136KB
-
MD5
45295780f2ba837be42ccf50710bd2b5
-
SHA1
f937b1b7b3593a38702f870077658a891974edda
-
SHA256
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025
-
SHA512
588666aa108f01334c2e0adc03aa68d5e3ebb68ee773939b668a5a6ca1eacf03570b7608d4ca3c936dd7f7ec6edd4063a05b1cef7d446661c8f00f8520e72f8b
Malware Config
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
http://smtpys6pvcvdvram6xucwecfv7rdhs6fmxzivrbcrncdeiphryhb75id.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 2 IoCs
pid Process 1664 cZcPGitnsrep.exe 1904 AZaddgnGZlan.exe -
Loads dropped DLL 4 IoCs
pid Process 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 268 icacls.exe 532 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1664 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 29 PID 2032 wrote to memory of 1664 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 29 PID 2032 wrote to memory of 1664 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 29 PID 2032 wrote to memory of 1664 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 29 PID 2032 wrote to memory of 1904 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 30 PID 2032 wrote to memory of 1904 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 30 PID 2032 wrote to memory of 1904 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 30 PID 2032 wrote to memory of 1904 2032 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe"C:\Users\Admin\AppData\Local\Temp\60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\cZcPGitnsrep.exe"C:\Users\Admin\AppData\Local\Temp\cZcPGitnsrep.exe" 9 REP2⤵
- Executes dropped EXE
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\AZaddgnGZlan.exe"C:\Users\Admin\AppData\Local\Temp\AZaddgnGZlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\gyVzdbybilan.exe"C:\Users\Admin\AppData\Local\Temp\gyVzdbybilan.exe" 8 LAN2⤵PID:1992
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:268
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:532
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:2072
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2100
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:2172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2976
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:1076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2888
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:1436
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y1⤵PID:2920