Analysis
-
max time kernel
164s -
max time network
185s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
22-01-2022 00:13
Static task
static1
Behavioral task
behavioral1
Sample
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
Resource
win10-en-20211208
General
-
Target
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
-
Size
9.5MB
-
MD5
a91173d3707d48a5c51240b9aa710f05
-
SHA1
1d99b42d879fa8652904f87a1fa9e4a2526e2be5
-
SHA256
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
-
SHA512
6ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\млѬПОёфяЛныи.txt
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 4 IoCs
Processes:
setup.exewinmngr.exesetup.tmpwinmngr.exepid process 3912 setup.exe 2952 winmngr.exe 1640 setup.tmp 716 winmngr.exe -
Loads dropped DLL 4 IoCs
Processes:
setup.tmppid process 1640 setup.tmp 1640 setup.tmp 1640 setup.tmp 1640 setup.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\WdiService\\winmngr.lnk" reg.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
winmngr.exedescription ioc process File created C:\Windows\assembly\Desktop.ini winmngr.exe File opened for modification C:\Windows\assembly\Desktop.ini winmngr.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
winmngr.exedescription pid process target process PID 2952 set thread context of 716 2952 winmngr.exe winmngr.exe PID 2952 set thread context of 1440 2952 winmngr.exe RegSvcs.exe -
Drops file in Windows directory 3 IoCs
Processes:
winmngr.exedescription ioc process File opened for modification C:\Windows\assembly winmngr.exe File created C:\Windows\assembly\Desktop.ini winmngr.exe File opened for modification C:\Windows\assembly\Desktop.ini winmngr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winmngr.exeRegSvcs.exepid process 2952 winmngr.exe 2952 winmngr.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
winmngr.exesetup.tmppid process 716 winmngr.exe 1640 setup.tmp -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
winmngr.exeRegSvcs.exewinmngr.exedescription pid process Token: SeDebugPrivilege 2952 winmngr.exe Token: SeDebugPrivilege 1440 RegSvcs.exe Token: SeDebugPrivilege 716 winmngr.exe Token: 33 716 winmngr.exe Token: SeIncBasePriorityPrivilege 716 winmngr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
winmngr.exepid process 716 winmngr.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exesetup.exewinmngr.execmd.exedescription pid process target process PID 3732 wrote to memory of 3912 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe setup.exe PID 3732 wrote to memory of 3912 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe setup.exe PID 3732 wrote to memory of 3912 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe setup.exe PID 3732 wrote to memory of 2952 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe winmngr.exe PID 3732 wrote to memory of 2952 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe winmngr.exe PID 3732 wrote to memory of 2952 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe winmngr.exe PID 3912 wrote to memory of 1640 3912 setup.exe setup.tmp PID 3912 wrote to memory of 1640 3912 setup.exe setup.tmp PID 3912 wrote to memory of 1640 3912 setup.exe setup.tmp PID 2952 wrote to memory of 1256 2952 winmngr.exe cmd.exe PID 2952 wrote to memory of 1256 2952 winmngr.exe cmd.exe PID 2952 wrote to memory of 1256 2952 winmngr.exe cmd.exe PID 1256 wrote to memory of 1208 1256 cmd.exe reg.exe PID 1256 wrote to memory of 1208 1256 cmd.exe reg.exe PID 1256 wrote to memory of 1208 1256 cmd.exe reg.exe PID 2952 wrote to memory of 716 2952 winmngr.exe winmngr.exe PID 2952 wrote to memory of 716 2952 winmngr.exe winmngr.exe PID 2952 wrote to memory of 716 2952 winmngr.exe winmngr.exe PID 2952 wrote to memory of 716 2952 winmngr.exe winmngr.exe PID 2952 wrote to memory of 716 2952 winmngr.exe winmngr.exe PID 2952 wrote to memory of 716 2952 winmngr.exe winmngr.exe PID 2952 wrote to memory of 716 2952 winmngr.exe winmngr.exe PID 2952 wrote to memory of 716 2952 winmngr.exe winmngr.exe PID 2952 wrote to memory of 1440 2952 winmngr.exe RegSvcs.exe PID 2952 wrote to memory of 1440 2952 winmngr.exe RegSvcs.exe PID 2952 wrote to memory of 1440 2952 winmngr.exe RegSvcs.exe PID 2952 wrote to memory of 1440 2952 winmngr.exe RegSvcs.exe PID 2952 wrote to memory of 1440 2952 winmngr.exe RegSvcs.exe PID 2952 wrote to memory of 1440 2952 winmngr.exe RegSvcs.exe PID 2952 wrote to memory of 1440 2952 winmngr.exe RegSvcs.exe PID 2952 wrote to memory of 1440 2952 winmngr.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe"C:\Users\Admin\AppData\Local\Temp\e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-ERMCO.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-ERMCO.tmp\setup.tmp" /SL5="$40118,8782861,270336,C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe" -n2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.lnk" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.lnk" /f4⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-ERMCO.tmp\setup.tmpMD5
2059d14f457c8e361a7f8c0bb95085d4
SHA1803c0d51e6488b88b0e68aa40fa5c60d37635433
SHA2566f93ca20b3d1bc406aaa40d4d6ba6a4e921795f93160c1014fd6dc6722aeb2f1
SHA512735e9e949d52be9e052d2d0f9a3c1972f29f100be660cfd09bee91b1e76092aa1a88a7afd0f58f00f60ccb327d47d20205a4d5a3b4c94fed71ab85075d72e3f1
-
C:\Users\Admin\AppData\Local\Temp\is-ERMCO.tmp\setup.tmpMD5
2059d14f457c8e361a7f8c0bb95085d4
SHA1803c0d51e6488b88b0e68aa40fa5c60d37635433
SHA2566f93ca20b3d1bc406aaa40d4d6ba6a4e921795f93160c1014fd6dc6722aeb2f1
SHA512735e9e949d52be9e052d2d0f9a3c1972f29f100be660cfd09bee91b1e76092aa1a88a7afd0f58f00f60ccb327d47d20205a4d5a3b4c94fed71ab85075d72e3f1
-
C:\Users\Admin\AppData\Local\Temp\setup.exeMD5
fd9755514f57d1aa9710c1bbc583c55b
SHA14f82d59f94ded324b4653a8c48e3ccc4a998f73d
SHA256cf76cbe1fdc62e1456fe837597980ebd3636d9c7d135cd4d8509e906c8c3e077
SHA51241df8b8f30d111099434af47b286e39ecd41a89bb54fc7eb99c029662d879c43937f96b749e8cca980ef4dccbc71bcdf3792d4aac8b033a556d35c5ad26c3e4a
-
C:\Users\Admin\AppData\Local\Temp\setup.exeMD5
fd9755514f57d1aa9710c1bbc583c55b
SHA14f82d59f94ded324b4653a8c48e3ccc4a998f73d
SHA256cf76cbe1fdc62e1456fe837597980ebd3636d9c7d135cd4d8509e906c8c3e077
SHA51241df8b8f30d111099434af47b286e39ecd41a89bb54fc7eb99c029662d879c43937f96b749e8cca980ef4dccbc71bcdf3792d4aac8b033a556d35c5ad26c3e4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\fl.txtMD5
998f57b1709b2031db20772f29d6a0ae
SHA1024ec47e91c2ded65f37236c2c2daf733f1818b3
SHA256997dbe11a10ae23bda118f5020a74841fbf0d3951d2b7d0cb4d4d1ae4558f750
SHA512c55a7139f3930fd7546e31496988b297a0195ada9b50040ec8325b6ad992deff193d103b0ccc28c37a61e219c926b47ba3af8183a3e572c4d4fc51f6609ce8ce
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exeMD5
a91173d3707d48a5c51240b9aa710f05
SHA11d99b42d879fa8652904f87a1fa9e4a2526e2be5
SHA256e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
SHA5126ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exeMD5
a91173d3707d48a5c51240b9aa710f05
SHA11d99b42d879fa8652904f87a1fa9e4a2526e2be5
SHA256e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
SHA5126ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exeMD5
a91173d3707d48a5c51240b9aa710f05
SHA11d99b42d879fa8652904f87a1fa9e4a2526e2be5
SHA256e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
SHA5126ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
-
\Users\Admin\AppData\Local\Temp\is-V78G2.tmp\bassmusic.dllMD5
8005750ec63eb5292884ad6183ae2e77
SHA1c83e31655e271cd9ef5bff62b10f8d51eb3ebf29
SHA256df9f56c4da160101567b0526845228ee481ee7d2f98391696fa27fe41f8acf15
SHA512febbc6374e9a5c7c9029ccbff2c0ecf448d76927c8d720a4eae513b345d2a3f6de8cf774ae40dcd335af59537666e83ce994ec0adc8b9e8ab4575415e3c3e206
-
\Users\Admin\AppData\Local\Temp\is-V78G2.tmp\innocallback.dllMD5
1c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
\Users\Admin\AppData\Local\Temp\is-V78G2.tmp\innocallback.dllMD5
1c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
\Users\Admin\AppData\Local\Temp\is-V78G2.tmp\innoextractor.dllMD5
d6c79afef36773206e479e0b1a7cf059
SHA15faa19aa1629e401915001a3392e3d916be38578
SHA2565b08aff352a39b7e10efdaa99efb27e02c2fe16b6e5c2e4c14b84a64eee86d6b
SHA5124016292d81779f635baf6f5756b6f07474a0265d3845a02937d30422427e11e5b27b8494689ebd6242c07f50642d2b2d3589f43d97b3b121927fb99bb1c2c5e2
-
memory/716-130-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/716-132-0x0000000001800000-0x0000000001810000-memory.dmpFilesize
64KB
-
memory/1440-133-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1440-134-0x0000000001510000-0x0000000001511000-memory.dmpFilesize
4KB
-
memory/1640-124-0x00000000005B0000-0x00000000005B1000-memory.dmpFilesize
4KB
-
memory/2952-122-0x0000000001BE0000-0x0000000001D2A000-memory.dmpFilesize
1.3MB
-
memory/3732-115-0x0000000001A10000-0x0000000001A11000-memory.dmpFilesize
4KB
-
memory/3912-118-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB