Overview
overview
10Static
static
8Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Ryuk
windows7_x64
10Analysis
-
max time kernel
301s -
max time network
287s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
23-04-2021 11:24
Static task
static1
Behavioral task
behavioral1
Sample
f937b1b7b3593a38702f870077658a891974edda.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
f2e040d2c5fea1fb5e9797f7deff0a63.exe
Resource
win7v20210410
Behavioral task
behavioral3
Sample
ea67e662ba55629b40d0eddbaaafc824e5809f31c9e35222104637a67615c51d.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
e430730620feec3673b9c38d87482c9294421b19.exe
Resource
win7v20210410
Behavioral task
behavioral5
Sample
de2b5aa6de6f7ff053308084217f7a9b977489027fb103729d6a7d94298c6a6b.exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
c4bd712a7f7185a2224806b85f3c6ac48de067e38d554608b3ee92422d902b28.exe
Resource
win7v20210408
Behavioral task
behavioral7
Sample
b513cfbd101e728ec41c9d6f6515278434820466bfe8e4bc1849f2418d3f86da.exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
ac94165d63c75f4adf1728aa2ecb776ac7c1c18e.exe
Resource
win7v20210408
Behavioral task
behavioral9
Sample
aaf3abc4054f800aaa429c4f2e4b20af.exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
aaec6ae400b38b95ae414481d8d45f0281cf26f59f8592567dfe2223f66024ad.exe
Resource
win7v20210408
Behavioral task
behavioral11
Sample
9b40b0d3b228d9e958c8d45fb8cec64c6851d113.exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
8879a8d1508c3297200c608f3a93da5387521767c050f17aed78dde8a0cbfe12.exe
Resource
win7v20210410
Behavioral task
behavioral13
Sample
7dee29fbeb5af549cb8a68dc47adf9721eb2b726.exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
75a3cf8ced873ee7bc415e27e108496b.exe
Resource
win7v20210410
Behavioral task
behavioral15
Sample
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe
Resource
win7v20210408
Behavioral task
behavioral16
Sample
4d74af75deddc969fef5fd89e65fa251.exe
Resource
win7v20210410
Behavioral task
behavioral17
Sample
45295780f2ba837be42ccf50710bd2b5.exe
Resource
win7v20210408
Behavioral task
behavioral18
Sample
352b1f3533ded8c575246d4466f68c49.exe
Resource
win7v20210410
Behavioral task
behavioral19
Sample
2b10ad4890c4d6e2861533cc7260a9fdc7871ea2.exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe
Resource
win7v20210408
Behavioral task
behavioral21
Sample
09472e7d9209b7cfc3bbc2e815a2aa843133395b.exe
Resource
win7v20210410
General
-
Target
1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe
-
Size
274KB
-
MD5
4d74af75deddc969fef5fd89e65fa251
-
SHA1
1dd4a0983a6884dddc3edf27eb5fdfc87664ed63
-
SHA256
8879a8d1508c3297200c608f3a93da5387521767c050f17aed78dde8a0cbfe12
-
SHA512
56cbd165259045e262b064bc1d5dd242304ef30f34b9b899b9295f79aabba02cb09438ab0c429c3828b5c13e8ebcb8f5dbae85eb4c9490f65cec9807a24d062c
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://rk2zzyh63g5avvii4irkhymha3irblchdfj7prk6zwy23f6kahidkpqd.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 3 IoCs
pid Process 1544 iRkoXDlZrrep.exe 1696 rmyblzCBElan.exe 2592 gHKVXXJzSlan.exe -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\PushRedo.png.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Users\Admin\Pictures\ResizeComplete.crw.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Users\Admin\Pictures\UninstallBlock.crw.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Users\Admin\Pictures\RegisterRead.png.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Users\Admin\Pictures\MountSwitch.raw.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe -
Loads dropped DLL 16 IoCs
pid Process 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 3852 MsiExec.exe 3852 MsiExec.exe 3852 MsiExec.exe 3852 MsiExec.exe 3852 MsiExec.exe 3852 MsiExec.exe 3852 MsiExec.exe 1540 msiexec.exe 1540 msiexec.exe 3100 MsiExec.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2692 icacls.exe 2704 icacls.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe -
Enumerates connected drives 3 TTPs 47 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\K: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\E: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\T: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\M: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\I: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\H: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\W: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\U: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\O: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\J: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\V: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\S: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\N: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\R: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\L: 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\STSUPLD.INTL.DLL 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\playlist.xml.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01304G.GIF 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0183290.WMF 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\SOCIALCONNECTORRES.DLL.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\vlc.mo 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\offset_window.html 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_shared.gif 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.text.nl_ja_4.4.0.v20140623020002.jar.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-settings.xml.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01548_.WMF.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099158.WMF.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC_COL.HXC.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\STUDIO.INF 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7FR.DLL 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup_ja.jar.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\vlc.mo.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.WW\RyukReadMe.html 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ui.zh_CN_5.5.0.165303.jar.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\OFFICE10.DLL 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Davis.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00732_.WMF.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0251871.WMF.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OIS_COL.HXC.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Swift_Current 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153095.WMF 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\Hiring Requisition - Customized.fdt 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Uninstall Information\RyukReadMe.html 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\dummy.luac.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\PREVIEW.GIF.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382955.JPG.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\RyukReadMe.html 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01840_.GIF 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Riyadh88.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216540.WMF.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Composite.xml.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\RyukReadMe.html 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaTypewriterRegular.ttf.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02431_.WMF 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\TASK.CFG.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\tzmappings.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-util-enumerations.jar.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\WSSFilesToolIconImages.jpg.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NL7Data0011.DLL.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGMAIN.XML.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\PREVIEW.GIF 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187895.WMF 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\Mso Example Intl Setup File A.txt.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\RyukReadMe.html 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0158477.WMF 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-BoldIt.otf.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_left_disable.gif.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\NamedURLs.HxK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME17.CSS 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_zh_4.4.0.v20140623020002.jar.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Recife.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\ED00184_.WMF.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Grid.thmx.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\EMAIL.DPV.RYK 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Port_Moresby 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME07.CSS 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\RyukReadMe.html 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIF25.tmp msiexec.exe File opened for modification C:\Windows\Installer\f75ebf4.mst msiexec.exe File opened for modification C:\Windows\Installer\MSIFAD6.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIB99.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDEC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI10EA.tmp msiexec.exe File created C:\Windows\Installer\f75ebf4.mst msiexec.exe File opened for modification C:\Windows\Installer\MSIEE26.tmp msiexec.exe File created C:\Windows\Installer\f75ebf6.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIF401.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF672.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID8D.tmp msiexec.exe File opened for modification C:\Windows\Installer\f75ebf6.ipi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7728 SCHTASKS.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\26 msiexec.exe -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\ShellEx\IconHandler msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\ShellEx\IconHandler msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\DefaultIcon msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\edit\command\ = "\"C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\OFFICE14\\MSOXMLED.EXE\" /verb edit \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\DefaultIcon\ = "\"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\ShellEx msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\ShellEx msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\open msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\shell\open msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\open\command msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\edit\command msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\edit msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\DefaultIcon msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\ShellEx\IconHandler\ = "{AB968F1E-E20B-403A-9EB8-72EB0EB6797E}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\shell\edit msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\shell\edit\command msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\open\command\ = "\"C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\OFFICE14\\MSOXMLED.EXE\" /verb open \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\xmlfile\ShellEx\IconHandler msiexec.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 1540 msiexec.exe 1540 msiexec.exe 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 1540 msiexec.exe 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeSecurityPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe Token: SeRestorePrivilege 1540 msiexec.exe Token: SeTakeOwnershipPrivilege 1540 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1544 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 29 PID 1840 wrote to memory of 1544 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 29 PID 1840 wrote to memory of 1544 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 29 PID 1840 wrote to memory of 1544 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 29 PID 1840 wrote to memory of 1696 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 30 PID 1840 wrote to memory of 1696 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 30 PID 1840 wrote to memory of 1696 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 30 PID 1840 wrote to memory of 1696 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 30 PID 1840 wrote to memory of 2592 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 31 PID 1840 wrote to memory of 2592 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 31 PID 1840 wrote to memory of 2592 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 31 PID 1840 wrote to memory of 2592 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 31 PID 1840 wrote to memory of 2692 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 32 PID 1840 wrote to memory of 2692 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 32 PID 1840 wrote to memory of 2692 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 32 PID 1840 wrote to memory of 2692 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 32 PID 1840 wrote to memory of 2704 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 33 PID 1840 wrote to memory of 2704 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 33 PID 1840 wrote to memory of 2704 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 33 PID 1840 wrote to memory of 2704 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 33 PID 1840 wrote to memory of 3212 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 36 PID 1840 wrote to memory of 3212 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 36 PID 1840 wrote to memory of 3212 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 36 PID 1840 wrote to memory of 3212 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 36 PID 3212 wrote to memory of 3244 3212 net.exe 39 PID 3212 wrote to memory of 3244 3212 net.exe 39 PID 3212 wrote to memory of 3244 3212 net.exe 39 PID 3212 wrote to memory of 3244 3212 net.exe 39 PID 1840 wrote to memory of 3252 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 38 PID 1840 wrote to memory of 3252 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 38 PID 1840 wrote to memory of 3252 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 38 PID 1840 wrote to memory of 3252 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 38 PID 1840 wrote to memory of 3284 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 41 PID 1840 wrote to memory of 3284 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 41 PID 1840 wrote to memory of 3284 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 41 PID 1840 wrote to memory of 3284 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 41 PID 3252 wrote to memory of 3316 3252 net.exe 43 PID 3252 wrote to memory of 3316 3252 net.exe 43 PID 3252 wrote to memory of 3316 3252 net.exe 43 PID 3252 wrote to memory of 3316 3252 net.exe 43 PID 3284 wrote to memory of 3736 3284 net.exe 46 PID 3284 wrote to memory of 3736 3284 net.exe 46 PID 3284 wrote to memory of 3736 3284 net.exe 46 PID 3284 wrote to memory of 3736 3284 net.exe 46 PID 1840 wrote to memory of 3800 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 44 PID 1840 wrote to memory of 3800 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 44 PID 1840 wrote to memory of 3800 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 44 PID 1840 wrote to memory of 3800 1840 1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe 44 PID 3800 wrote to memory of 3972 3800 net.exe 47 PID 3800 wrote to memory of 3972 3800 net.exe 47 PID 3800 wrote to memory of 3972 3800 net.exe 47 PID 3800 wrote to memory of 3972 3800 net.exe 47 PID 1540 wrote to memory of 3852 1540 msiexec.exe 50 PID 1540 wrote to memory of 3852 1540 msiexec.exe 50 PID 1540 wrote to memory of 3852 1540 msiexec.exe 50 PID 1540 wrote to memory of 3852 1540 msiexec.exe 50 PID 1540 wrote to memory of 3852 1540 msiexec.exe 50 PID 1540 wrote to memory of 3852 1540 msiexec.exe 50 PID 1540 wrote to memory of 3852 1540 msiexec.exe 50 PID 1540 wrote to memory of 3100 1540 msiexec.exe 51 PID 1540 wrote to memory of 3100 1540 msiexec.exe 51 PID 1540 wrote to memory of 3100 1540 msiexec.exe 51 PID 1540 wrote to memory of 3100 1540 msiexec.exe 51 PID 1540 wrote to memory of 3100 1540 msiexec.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe"C:\Users\Admin\AppData\Local\Temp\1dd4a0983a6884dddc3edf27eb5fdfc87664ed63.exe"1⤵
- Modifies extensions of user files
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\iRkoXDlZrrep.exe"C:\Users\Admin\AppData\Local\Temp\iRkoXDlZrrep.exe" 9 REP2⤵
- Executes dropped EXE
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\rmyblzCBElan.exe"C:\Users\Admin\AppData\Local\Temp\rmyblzCBElan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\gHKVXXJzSlan.exe"C:\Users\Admin\AppData\Local\Temp\gHKVXXJzSlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:2592
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2692
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2704
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:3244
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:3316
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:3736
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:3972
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:7996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:7368
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:8180
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:6428
-
-
-
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /CREATE /NP /SC DAILY /TN "Printxz" /TR "C:\Windows\System32\cmd.exe /c for /l %x in (1,1,50) do start wordpad.exe /p C:\users\Public\Xy84e.dll" /ST 10:25 /SD 04/24/2021 /ED 05/01/20212⤵
- Creates scheduled task(s)
PID:7728
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:8888
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8920
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:8936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8964
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2E5C9699F4C24D43B60E4E00A0CE22AD2⤵
- Loads dropped DLL
PID:3852
-
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding A5E11C741BAB53E4A363B2DE643442FC2⤵
- Loads dropped DLL
PID:3100
-