Analysis
-
max time kernel
268s -
max time network
208s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
04-07-2021 23:43
Static task
static1
Behavioral task
behavioral1
Sample
35ff457Rk.bin.exe.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
35ff457Rk.bin.exe.bin.exe
Resource
win10v20210408
General
-
Target
35ff457Rk.bin.exe.bin.exe
-
Size
304KB
-
MD5
5ecae137bf33ecbb981f3b637b06efc5
-
SHA1
371e01949b1c7316164021e38d624ffbcba3090a
-
SHA256
4f6db0454c9afe37d358d1399fe8932bec799eb257df11eccc6ab87358c4efb3
-
SHA512
753a63b1407b21cec5e50bd5ad7158917926c6502ac43ffb61e99a911371798bb05be2845598640ac018dd7d57ccddf3c1f7736d22d0b2c2edde2eb7188d0331
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://vqurn5zgys2zd5z5r5fxnfskpzr74i63ehk7ucmrlbvsuszapwoo62qd.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 2 IoCs
pid Process 284 1073r.exe 668 xasiuSyKTlan.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\OptimizeUninstall.crw => C:\Users\Admin\Pictures\OptimizeUninstall.crw.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Users\Admin\Pictures\OptimizeUninstall.crw.RYK 35ff457Rk.bin.exe.bin.exe -
Loads dropped DLL 4 IoCs
pid Process 1072 35ff457Rk.bin.exe.bin.exe 1072 35ff457Rk.bin.exe.bin.exe 1072 35ff457Rk.bin.exe.bin.exe 1072 35ff457Rk.bin.exe.bin.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 35ff457Rk.bin.exe.bin.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\P: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\O: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\I: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\E: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\Z: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\Y: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\X: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\N: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\H: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\B: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\L: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\U: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\S: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\M: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\Q: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\K: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\J: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\G: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\F: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\W: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\V: 35ff457Rk.bin.exe.bin.exe File opened (read-only) \??\R: 35ff457Rk.bin.exe.bin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host.xml 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03453_.WMF 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\DataMatrix.pmp.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH00601G.GIF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\security\US_export_policy.jar 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Damascus.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Stanley.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN048.XML.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\reflect.png 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Inuvik.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200377.WMF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00183_.WMF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Winamac 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\RyukReadMe.html 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178639.JPG 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Concourse.xml 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\SNEEZE.WAV.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\.eclipseproduct 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-actions.xml 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21433_.GIF 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\RyukReadMe.html 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+2.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_zh_CN.jar.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\WSS.ICO.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\engphon.env 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00045_.WMF 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00234_.WMF 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBCOLOR.SCM 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR12F.GIF 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\RyukReadMe.html 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\tipresx.dll.mui 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Qatar 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-execution.jar.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Verve.xml.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\JOURNAL.ELM.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\RyukReadMe.html 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\RyukReadMe.html 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCDRESPL.ICO.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORES.DLL.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\org-openide-filesystems_zh_CN.jar.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.config.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\DBGHELP.DLL.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-settings.xml 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\end_review.gif.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_gtk.css 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01138_.WMF 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107148.WMF 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-api-progress.jar.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US.txt.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199307.WMF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215210.WMF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR30F.GIF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\RyukReadMe.html 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00525_.WMF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099205.WMF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-modules-favorites.xml_hidden.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02356_.WMF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\TAB_ON.GIF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\TAB_ON.GIF.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTaskIcon.jpg.RYK 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.text.nl_zh_4.4.0.v20140623020002.jar 35ff457Rk.bin.exe.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-profiler.xml 35ff457Rk.bin.exe.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1072 35ff457Rk.bin.exe.bin.exe 1072 35ff457Rk.bin.exe.bin.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1072 35ff457Rk.bin.exe.bin.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1072 wrote to memory of 284 1072 35ff457Rk.bin.exe.bin.exe 29 PID 1072 wrote to memory of 284 1072 35ff457Rk.bin.exe.bin.exe 29 PID 1072 wrote to memory of 284 1072 35ff457Rk.bin.exe.bin.exe 29 PID 1072 wrote to memory of 284 1072 35ff457Rk.bin.exe.bin.exe 29 PID 1072 wrote to memory of 668 1072 35ff457Rk.bin.exe.bin.exe 30 PID 1072 wrote to memory of 668 1072 35ff457Rk.bin.exe.bin.exe 30 PID 1072 wrote to memory of 668 1072 35ff457Rk.bin.exe.bin.exe 30 PID 1072 wrote to memory of 668 1072 35ff457Rk.bin.exe.bin.exe 30 PID 1072 wrote to memory of 680 1072 35ff457Rk.bin.exe.bin.exe 31 PID 1072 wrote to memory of 680 1072 35ff457Rk.bin.exe.bin.exe 31 PID 1072 wrote to memory of 680 1072 35ff457Rk.bin.exe.bin.exe 31 PID 1072 wrote to memory of 680 1072 35ff457Rk.bin.exe.bin.exe 31 PID 1072 wrote to memory of 864 1072 35ff457Rk.bin.exe.bin.exe 32 PID 1072 wrote to memory of 864 1072 35ff457Rk.bin.exe.bin.exe 32 PID 1072 wrote to memory of 864 1072 35ff457Rk.bin.exe.bin.exe 32 PID 1072 wrote to memory of 864 1072 35ff457Rk.bin.exe.bin.exe 32 PID 864 wrote to memory of 1212 864 net.exe 35 PID 864 wrote to memory of 1212 864 net.exe 35 PID 864 wrote to memory of 1212 864 net.exe 35 PID 864 wrote to memory of 1212 864 net.exe 35 PID 680 wrote to memory of 1920 680 net.exe 42 PID 680 wrote to memory of 1920 680 net.exe 42 PID 680 wrote to memory of 1920 680 net.exe 42 PID 680 wrote to memory of 1920 680 net.exe 42 PID 1072 wrote to memory of 1432 1072 35ff457Rk.bin.exe.bin.exe 39 PID 1072 wrote to memory of 1432 1072 35ff457Rk.bin.exe.bin.exe 39 PID 1072 wrote to memory of 1432 1072 35ff457Rk.bin.exe.bin.exe 39 PID 1072 wrote to memory of 1432 1072 35ff457Rk.bin.exe.bin.exe 39 PID 1072 wrote to memory of 1824 1072 35ff457Rk.bin.exe.bin.exe 38 PID 1072 wrote to memory of 1824 1072 35ff457Rk.bin.exe.bin.exe 38 PID 1072 wrote to memory of 1824 1072 35ff457Rk.bin.exe.bin.exe 38 PID 1072 wrote to memory of 1824 1072 35ff457Rk.bin.exe.bin.exe 38 PID 1432 wrote to memory of 1256 1432 net.exe 41 PID 1432 wrote to memory of 1256 1432 net.exe 41 PID 1432 wrote to memory of 1256 1432 net.exe 41 PID 1432 wrote to memory of 1256 1432 net.exe 41 PID 1824 wrote to memory of 1204 1824 net.exe 40 PID 1824 wrote to memory of 1204 1824 net.exe 40 PID 1824 wrote to memory of 1204 1824 net.exe 40 PID 1824 wrote to memory of 1204 1824 net.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\35ff457Rk.bin.exe.bin.exe"C:\Users\Admin\AppData\Local\Temp\35ff457Rk.bin.exe.bin.exe"1⤵
- Modifies extensions of user files
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\1073r.exe"C:\Users\Admin\AppData\Local\Temp\1073r.exe" 9 REP2⤵
- Executes dropped EXE
PID:284
-
-
C:\Users\Admin\AppData\Local\Temp\xasiuSyKTlan.exe"C:\Users\Admin\AppData\Local\Temp\xasiuSyKTlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:668
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1920
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1212
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1204
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1256
-
-