Resubmissions

20-10-2021 08:57

211020-kwsc4aggf9 10

20-10-2021 08:46

211020-kpcdashgcj 10

Analysis

  • max time kernel
    85s
  • max time network
    93s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    20-10-2021 08:57

General

  • Target

    f130530949c0e3adca48ba558980b634c0a78c8faa5572718b665cc7abfd7703.bin.sample.exe

  • Size

    170KB

  • MD5

    1bd7d1b87c5091a9653fe8005892b784

  • SHA1

    3dcf19b833266a3591fd97c93e5b9bca4ac2c21c

  • SHA256

    f130530949c0e3adca48ba558980b634c0a78c8faa5572718b665cc7abfd7703

  • SHA512

    4c13373a150b1e3bd12fdd9ad5c379a43e41c59ba5b6dd6982c79599839128bcbde30d7083a810d66604382f4d5aff24c22b504fdaab03f6743a7dc263d85651

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorithm. Backups were either encrypted or deleted or backup disks were formatted. Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. We exclusively have decryption software for your situation No decryption software is available in the public. DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT RENAME OR MOVE the encrypted and readme files. DO NOT DELETE readme files. This may lead to the impossibility of recovery of the certain files. To get info (decrypt your files) contact us at WayneEvenson@protonmail.com or WayneEvenson@tutanota.com BTC wallet: 14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk Ryuk No system is safe
Emails

WayneEvenson@protonmail.com

WayneEvenson@tutanota.com

Wallets

14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
  • Sets service image path in registry 2 TTPs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks processor information in registry 2 TTPs 23 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:3052
    • C:\Windows\system32\sihost.exe
      sihost.exe
      1⤵
      • Drops startup file
      • Drops file in Program Files directory
      PID:2060
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:3648
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 3648 -s 2520
          2⤵
          • Program crash
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:4000
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3744
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:3900
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:4020
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 4020 -s 444
              2⤵
              • Program crash
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:4616
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
            1⤵
              PID:4212
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 4212 -s 904
                2⤵
                • Program crash
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:5024
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
              1⤵
                PID:3880
              • C:\Windows\System32\smartscreen.exe
                C:\Windows\System32\smartscreen.exe -Embedding
                1⤵
                  PID:4332
                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                  1⤵
                    PID:3636
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                    1⤵
                      PID:3360
                    • C:\Users\Admin\AppData\Local\Temp\f130530949c0e3adca48ba558980b634c0a78c8faa5572718b665cc7abfd7703.bin.sample.exe
                      "C:\Users\Admin\AppData\Local\Temp\f130530949c0e3adca48ba558980b634c0a78c8faa5572718b665cc7abfd7703.bin.sample.exe"
                      1⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:5100
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\f130530949c0e3adca48ba558980b634c0a78c8faa5572718b665cc7abfd7703.bin.sample.exe" /f
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1956
                        • C:\Windows\system32\reg.exe
                          REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\f130530949c0e3adca48ba558980b634c0a78c8faa5572718b665cc7abfd7703.bin.sample.exe" /f
                          3⤵
                          • Adds Run key to start application
                          PID:2400
                    • C:\Windows\System32\Upfc.exe
                      C:\Windows\System32\Upfc.exe /launchtype periodic /cv xvr26FWfUE+dxGj/FwtjkQ.0
                      1⤵
                        PID:1660
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4956
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                        1⤵
                        • Modifies data under HKEY_USERS
                        PID:4536
                      • C:\Windows\System32\sihclient.exe
                        C:\Windows\System32\sihclient.exe /cv roe7HoQykUCc7QAfwLsm0A.0.2
                        1⤵
                          PID:4544
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                          1⤵
                            PID:824
                          • C:\Windows\System32\WaaSMedicAgent.exe
                            C:\Windows\System32\WaaSMedicAgent.exe 1e7f5cfd5cbc41958340b0d0c1bca9da roe7HoQykUCc7QAfwLsm0A.0.1.0.3.0
                            1⤵
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4080
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                            1⤵
                            • Drops file in Windows directory
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4456
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                            1⤵
                            • Checks processor information in registry
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:1320
                            • C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
                              C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
                              2⤵
                                PID:3164
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -pss -s 408 -p 4020 -ip 4020
                              1⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              • Suspicious use of WriteProcessMemory
                              PID:2148
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -pss -s 440 -p 4212 -ip 4212
                              1⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              • Suspicious use of WriteProcessMemory
                              PID:2084
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -pss -s 484 -p 3648 -ip 3648
                              1⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              • Suspicious use of WriteProcessMemory
                              PID:4544
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                              • Modifies registry class
                              • Suspicious use of SetWindowsHookEx
                              PID:17352
                            • C:\Windows\System32\WaaSMedicAgent.exe
                              C:\Windows\System32\WaaSMedicAgent.exe 1e7f5cfd5cbc41958340b0d0c1bca9da roe7HoQykUCc7QAfwLsm0A.0.1.0.3.0
                              1⤵
                              • Modifies data under HKEY_USERS
                              PID:45780

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Persistence

                            Registry Run Keys / Startup Folder

                            2
                            T1060

                            Defense Evasion

                            Modify Registry

                            2
                            T1112

                            Discovery

                            System Information Discovery

                            3
                            T1082

                            Query Registry

                            2
                            T1012

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\Microsoft\Network\Downloader\edb.log
                              MD5

                              92079f84a3356b2b9d58555babfe5e22

                              SHA1

                              765b633155c076a0a33c78bb81d0823bf02c7225

                              SHA256

                              6ffe40773163d5f4ac5b98c85931f498861e78b7181067dd5a95960a851d85c8

                              SHA512

                              f09e9f338f02622bd9bf0ef2e7ce7ef3c6a6ee1ff0016899e9a707ae750730e5b2708f0074f41b4fb9ef0328c664e22927c283670443f7834d6f9abbbba36635

                            • C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
                              MD5

                              6c5b27babcd2bea420328d335278ccc1

                              SHA1

                              9be63594dd3113af0b739aab895255ea07f39ec1

                              SHA256

                              0a71daf3baa226bfd2d94c3201d2013033a2dc3d2fe759a1ee303cf3e36eaf53

                              SHA512

                              6641c5d0b8fdb9fecfb1e550a5a6823be3a2d820497102707218469e37d7c0666c7ae3e0d9f961b41773530fe0715824f92b08c18f7fa3faf887eec60d8c43a0

                            • C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
                              MD5

                              f69bbc04c1cebf5e5fd0c3ed570290eb

                              SHA1

                              c10b07159434b5d20b9f5603d473285fcbcbec5a

                              SHA256

                              6b1dff53a69d97d53fa8e2a63958ba36e9d727b54582e12db5dee725c4d8b456

                              SHA512

                              1ef6a0cda698ea1ae47de45edcbeb02905851ab4f577144fb8cfd91ed404207934f0328a5f0d81cf300df6ab74ec4e482a059990e6b8f75363850d10d35db0a0

                            • memory/1956-152-0x0000000000000000-mapping.dmp
                            • memory/2060-155-0x00007FF6E0F70000-0x00007FF6E12FE000-memory.dmp
                              Filesize

                              3.6MB

                            • memory/2400-153-0x0000000000000000-mapping.dmp
                            • memory/3164-154-0x0000000000000000-mapping.dmp
                            • memory/4456-151-0x0000022B82960000-0x0000022B82964000-memory.dmp
                              Filesize

                              16KB

                            • memory/4536-146-0x00000214BA570000-0x00000214BA580000-memory.dmp
                              Filesize

                              64KB

                            • memory/4536-148-0x00000214BA9F0000-0x00000214BA9F4000-memory.dmp
                              Filesize

                              16KB

                            • memory/4536-147-0x00000214BA5F0000-0x00000214BA600000-memory.dmp
                              Filesize

                              64KB

                            • memory/17352-156-0x000001F339830000-0x000001F339832000-memory.dmp
                              Filesize

                              8KB

                            • memory/17352-157-0x000001F339830000-0x000001F339832000-memory.dmp
                              Filesize

                              8KB

                            • memory/17352-158-0x000001F339830000-0x000001F339832000-memory.dmp
                              Filesize

                              8KB