Analysis
-
max time kernel
110s -
max time network
55s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
10-07-2021 10:35
Static task
static1
Behavioral task
behavioral1
Sample
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe
Resource
win10v20210408
General
-
Target
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe
-
Size
136KB
-
MD5
45295780f2ba837be42ccf50710bd2b5
-
SHA1
f937b1b7b3593a38702f870077658a891974edda
-
SHA256
60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025
-
SHA512
588666aa108f01334c2e0adc03aa68d5e3ebb68ee773939b668a5a6ca1eacf03570b7608d4ca3c936dd7f7ec6edd4063a05b1cef7d446661c8f00f8520e72f8b
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\RyukReadMe.html
ryuk
http://smtpys6pvcvdvram6xucwecfv7rdhs6fmxzivrbcrncdeiphryhb75id.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 2 IoCs
pid Process 1684 YGnuTcxQDrep.exe 744 FNhVCISQWlan.exe -
Loads dropped DLL 4 IoCs
pid Process 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 568 icacls.exe 1108 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1684 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 29 PID 1824 wrote to memory of 1684 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 29 PID 1824 wrote to memory of 1684 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 29 PID 1824 wrote to memory of 1684 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 29 PID 1824 wrote to memory of 744 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 30 PID 1824 wrote to memory of 744 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 30 PID 1824 wrote to memory of 744 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 30 PID 1824 wrote to memory of 744 1824 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe"C:\Users\Admin\AppData\Local\Temp\60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\YGnuTcxQDrep.exe"C:\Users\Admin\AppData\Local\Temp\YGnuTcxQDrep.exe" 9 REP2⤵
- Executes dropped EXE
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\FNhVCISQWlan.exe"C:\Users\Admin\AppData\Local\Temp\FNhVCISQWlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\UYDAmZoGWlan.exe"C:\Users\Admin\AppData\Local\Temp\UYDAmZoGWlan.exe" 8 LAN2⤵PID:756
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:568
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1108
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:2388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1660
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:2360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1324
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:1508
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2540
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2848
-
-