Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-01-2022 00:13
Static task
static1
Behavioral task
behavioral1
Sample
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
Resource
win10-en-20211208
General
-
Target
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
-
Size
9.5MB
-
MD5
a91173d3707d48a5c51240b9aa710f05
-
SHA1
1d99b42d879fa8652904f87a1fa9e4a2526e2be5
-
SHA256
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
-
SHA512
6ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\млѬПОёфяЛныи.txt
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 4 IoCs
Processes:
setup.exesetup.tmpwinmngr.exewinmngr.exepid process 672 setup.exe 1436 setup.tmp 1412 winmngr.exe 676 winmngr.exe -
Loads dropped DLL 10 IoCs
Processes:
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exesetup.exesetup.tmpwinmngr.exepid process 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe 672 setup.exe 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe 1436 setup.tmp 1436 setup.tmp 1436 setup.tmp 1436 setup.tmp 1436 setup.tmp 1412 winmngr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\WdiService\\winmngr.lnk" reg.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
winmngr.exedescription pid process target process PID 1412 set thread context of 676 1412 winmngr.exe winmngr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winmngr.exepid process 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe 1412 winmngr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
winmngr.exesetup.tmppid process 676 winmngr.exe 1436 setup.tmp -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
winmngr.exewinmngr.exedescription pid process Token: SeDebugPrivilege 1412 winmngr.exe Token: SeDebugPrivilege 676 winmngr.exe Token: 33 676 winmngr.exe Token: SeIncBasePriorityPrivilege 676 winmngr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
winmngr.exepid process 676 winmngr.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exesetup.exewinmngr.execmd.exedescription pid process target process PID 980 wrote to memory of 672 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe setup.exe PID 980 wrote to memory of 672 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe setup.exe PID 980 wrote to memory of 672 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe setup.exe PID 980 wrote to memory of 672 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe setup.exe PID 980 wrote to memory of 672 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe setup.exe PID 980 wrote to memory of 672 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe setup.exe PID 980 wrote to memory of 672 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe setup.exe PID 672 wrote to memory of 1436 672 setup.exe setup.tmp PID 672 wrote to memory of 1436 672 setup.exe setup.tmp PID 672 wrote to memory of 1436 672 setup.exe setup.tmp PID 672 wrote to memory of 1436 672 setup.exe setup.tmp PID 672 wrote to memory of 1436 672 setup.exe setup.tmp PID 672 wrote to memory of 1436 672 setup.exe setup.tmp PID 672 wrote to memory of 1436 672 setup.exe setup.tmp PID 980 wrote to memory of 1412 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe winmngr.exe PID 980 wrote to memory of 1412 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe winmngr.exe PID 980 wrote to memory of 1412 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe winmngr.exe PID 980 wrote to memory of 1412 980 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe winmngr.exe PID 1412 wrote to memory of 308 1412 winmngr.exe cmd.exe PID 1412 wrote to memory of 308 1412 winmngr.exe cmd.exe PID 1412 wrote to memory of 308 1412 winmngr.exe cmd.exe PID 1412 wrote to memory of 308 1412 winmngr.exe cmd.exe PID 308 wrote to memory of 1988 308 cmd.exe reg.exe PID 308 wrote to memory of 1988 308 cmd.exe reg.exe PID 308 wrote to memory of 1988 308 cmd.exe reg.exe PID 308 wrote to memory of 1988 308 cmd.exe reg.exe PID 1412 wrote to memory of 676 1412 winmngr.exe winmngr.exe PID 1412 wrote to memory of 676 1412 winmngr.exe winmngr.exe PID 1412 wrote to memory of 676 1412 winmngr.exe winmngr.exe PID 1412 wrote to memory of 676 1412 winmngr.exe winmngr.exe PID 1412 wrote to memory of 676 1412 winmngr.exe winmngr.exe PID 1412 wrote to memory of 676 1412 winmngr.exe winmngr.exe PID 1412 wrote to memory of 676 1412 winmngr.exe winmngr.exe PID 1412 wrote to memory of 676 1412 winmngr.exe winmngr.exe PID 1412 wrote to memory of 676 1412 winmngr.exe winmngr.exe PID 1412 wrote to memory of 1516 1412 winmngr.exe RegSvcs.exe PID 1412 wrote to memory of 1516 1412 winmngr.exe RegSvcs.exe PID 1412 wrote to memory of 1516 1412 winmngr.exe RegSvcs.exe PID 1412 wrote to memory of 1516 1412 winmngr.exe RegSvcs.exe PID 1412 wrote to memory of 1516 1412 winmngr.exe RegSvcs.exe PID 1412 wrote to memory of 1516 1412 winmngr.exe RegSvcs.exe PID 1412 wrote to memory of 1516 1412 winmngr.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe"C:\Users\Admin\AppData\Local\Temp\e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-5IJPI.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-5IJPI.tmp\setup.tmp" /SL5="$30108,8782861,270336,C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe" -n2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.lnk" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.lnk" /f4⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-5IJPI.tmp\setup.tmpMD5
2059d14f457c8e361a7f8c0bb95085d4
SHA1803c0d51e6488b88b0e68aa40fa5c60d37635433
SHA2566f93ca20b3d1bc406aaa40d4d6ba6a4e921795f93160c1014fd6dc6722aeb2f1
SHA512735e9e949d52be9e052d2d0f9a3c1972f29f100be660cfd09bee91b1e76092aa1a88a7afd0f58f00f60ccb327d47d20205a4d5a3b4c94fed71ab85075d72e3f1
-
C:\Users\Admin\AppData\Local\Temp\is-5IJPI.tmp\setup.tmpMD5
2059d14f457c8e361a7f8c0bb95085d4
SHA1803c0d51e6488b88b0e68aa40fa5c60d37635433
SHA2566f93ca20b3d1bc406aaa40d4d6ba6a4e921795f93160c1014fd6dc6722aeb2f1
SHA512735e9e949d52be9e052d2d0f9a3c1972f29f100be660cfd09bee91b1e76092aa1a88a7afd0f58f00f60ccb327d47d20205a4d5a3b4c94fed71ab85075d72e3f1
-
C:\Users\Admin\AppData\Local\Temp\setup.exeMD5
fd9755514f57d1aa9710c1bbc583c55b
SHA14f82d59f94ded324b4653a8c48e3ccc4a998f73d
SHA256cf76cbe1fdc62e1456fe837597980ebd3636d9c7d135cd4d8509e906c8c3e077
SHA51241df8b8f30d111099434af47b286e39ecd41a89bb54fc7eb99c029662d879c43937f96b749e8cca980ef4dccbc71bcdf3792d4aac8b033a556d35c5ad26c3e4a
-
C:\Users\Admin\AppData\Local\Temp\setup.exeMD5
fd9755514f57d1aa9710c1bbc583c55b
SHA14f82d59f94ded324b4653a8c48e3ccc4a998f73d
SHA256cf76cbe1fdc62e1456fe837597980ebd3636d9c7d135cd4d8509e906c8c3e077
SHA51241df8b8f30d111099434af47b286e39ecd41a89bb54fc7eb99c029662d879c43937f96b749e8cca980ef4dccbc71bcdf3792d4aac8b033a556d35c5ad26c3e4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exeMD5
a91173d3707d48a5c51240b9aa710f05
SHA11d99b42d879fa8652904f87a1fa9e4a2526e2be5
SHA256e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
SHA5126ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exeMD5
a91173d3707d48a5c51240b9aa710f05
SHA11d99b42d879fa8652904f87a1fa9e4a2526e2be5
SHA256e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
SHA5126ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exeMD5
a91173d3707d48a5c51240b9aa710f05
SHA11d99b42d879fa8652904f87a1fa9e4a2526e2be5
SHA256e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
SHA5126ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
-
\Users\Admin\AppData\Local\Temp\is-5IJPI.tmp\setup.tmpMD5
2059d14f457c8e361a7f8c0bb95085d4
SHA1803c0d51e6488b88b0e68aa40fa5c60d37635433
SHA2566f93ca20b3d1bc406aaa40d4d6ba6a4e921795f93160c1014fd6dc6722aeb2f1
SHA512735e9e949d52be9e052d2d0f9a3c1972f29f100be660cfd09bee91b1e76092aa1a88a7afd0f58f00f60ccb327d47d20205a4d5a3b4c94fed71ab85075d72e3f1
-
\Users\Admin\AppData\Local\Temp\is-C5OGR.tmp\_isetup\_shfoldr.dllMD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-C5OGR.tmp\_isetup\_shfoldr.dllMD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-C5OGR.tmp\bassmusic.dllMD5
8005750ec63eb5292884ad6183ae2e77
SHA1c83e31655e271cd9ef5bff62b10f8d51eb3ebf29
SHA256df9f56c4da160101567b0526845228ee481ee7d2f98391696fa27fe41f8acf15
SHA512febbc6374e9a5c7c9029ccbff2c0ecf448d76927c8d720a4eae513b345d2a3f6de8cf774ae40dcd335af59537666e83ce994ec0adc8b9e8ab4575415e3c3e206
-
\Users\Admin\AppData\Local\Temp\is-C5OGR.tmp\innocallback.dllMD5
1c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
\Users\Admin\AppData\Local\Temp\is-C5OGR.tmp\innoextractor.dllMD5
d6c79afef36773206e479e0b1a7cf059
SHA15faa19aa1629e401915001a3392e3d916be38578
SHA2565b08aff352a39b7e10efdaa99efb27e02c2fe16b6e5c2e4c14b84a64eee86d6b
SHA5124016292d81779f635baf6f5756b6f07474a0265d3845a02937d30422427e11e5b27b8494689ebd6242c07f50642d2b2d3589f43d97b3b121927fb99bb1c2c5e2
-
\Users\Admin\AppData\Local\Temp\setup.exeMD5
fd9755514f57d1aa9710c1bbc583c55b
SHA14f82d59f94ded324b4653a8c48e3ccc4a998f73d
SHA256cf76cbe1fdc62e1456fe837597980ebd3636d9c7d135cd4d8509e906c8c3e077
SHA51241df8b8f30d111099434af47b286e39ecd41a89bb54fc7eb99c029662d879c43937f96b749e8cca980ef4dccbc71bcdf3792d4aac8b033a556d35c5ad26c3e4a
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exeMD5
a91173d3707d48a5c51240b9aa710f05
SHA11d99b42d879fa8652904f87a1fa9e4a2526e2be5
SHA256e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
SHA5126ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exeMD5
a91173d3707d48a5c51240b9aa710f05
SHA11d99b42d879fa8652904f87a1fa9e4a2526e2be5
SHA256e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
SHA5126ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exeMD5
a91173d3707d48a5c51240b9aa710f05
SHA11d99b42d879fa8652904f87a1fa9e4a2526e2be5
SHA256e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
SHA5126ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
-
memory/672-60-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/676-87-0x0000000000C20000-0x0000000000C21000-memory.dmpFilesize
4KB
-
memory/676-82-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/676-83-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/676-79-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/676-80-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/676-81-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/980-54-0x00000000751B1000-0x00000000751B3000-memory.dmpFilesize
8KB
-
memory/980-55-0x0000000002BA0000-0x0000000002BA1000-memory.dmpFilesize
4KB
-
memory/1412-77-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB
-
memory/1436-74-0x00000000003D0000-0x00000000003E5000-memory.dmpFilesize
84KB
-
memory/1436-65-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB