Analysis
-
max time kernel
164s -
max time network
185s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
22-01-2022 00:13
Static task
static1
Behavioral task
behavioral1
Sample
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
Resource
win10-en-20211208
General
-
Target
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe
-
Size
9.5MB
-
MD5
a91173d3707d48a5c51240b9aa710f05
-
SHA1
1d99b42d879fa8652904f87a1fa9e4a2526e2be5
-
SHA256
e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68
-
SHA512
6ed3bdef2ef3403f5cc0fabdafd1e514c15d6f12055833545b34c12e11f3cf3eb9a339b314c03d237e56f0e1775b332464daa28d010f8193d82a3a18a0173de1
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\млѬПОёфяЛныи.txt
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 4 IoCs
pid Process 3912 setup.exe 2952 winmngr.exe 1640 setup.tmp 716 winmngr.exe -
Loads dropped DLL 4 IoCs
pid Process 1640 setup.tmp 1640 setup.tmp 1640 setup.tmp 1640 setup.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\WdiService\\winmngr.lnk" reg.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini winmngr.exe File opened for modification C:\Windows\assembly\Desktop.ini winmngr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2952 set thread context of 716 2952 winmngr.exe 77 PID 2952 set thread context of 1440 2952 winmngr.exe 78 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly winmngr.exe File created C:\Windows\assembly\Desktop.ini winmngr.exe File opened for modification C:\Windows\assembly\Desktop.ini winmngr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2952 winmngr.exe 2952 winmngr.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 2952 winmngr.exe 1440 RegSvcs.exe 1440 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 716 winmngr.exe 1640 setup.tmp -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2952 winmngr.exe Token: SeDebugPrivilege 1440 RegSvcs.exe Token: SeDebugPrivilege 716 winmngr.exe Token: 33 716 winmngr.exe Token: SeIncBasePriorityPrivilege 716 winmngr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 716 winmngr.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 3732 wrote to memory of 3912 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe 71 PID 3732 wrote to memory of 3912 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe 71 PID 3732 wrote to memory of 3912 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe 71 PID 3732 wrote to memory of 2952 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe 72 PID 3732 wrote to memory of 2952 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe 72 PID 3732 wrote to memory of 2952 3732 e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe 72 PID 3912 wrote to memory of 1640 3912 setup.exe 73 PID 3912 wrote to memory of 1640 3912 setup.exe 73 PID 3912 wrote to memory of 1640 3912 setup.exe 73 PID 2952 wrote to memory of 1256 2952 winmngr.exe 74 PID 2952 wrote to memory of 1256 2952 winmngr.exe 74 PID 2952 wrote to memory of 1256 2952 winmngr.exe 74 PID 1256 wrote to memory of 1208 1256 cmd.exe 76 PID 1256 wrote to memory of 1208 1256 cmd.exe 76 PID 1256 wrote to memory of 1208 1256 cmd.exe 76 PID 2952 wrote to memory of 716 2952 winmngr.exe 77 PID 2952 wrote to memory of 716 2952 winmngr.exe 77 PID 2952 wrote to memory of 716 2952 winmngr.exe 77 PID 2952 wrote to memory of 716 2952 winmngr.exe 77 PID 2952 wrote to memory of 716 2952 winmngr.exe 77 PID 2952 wrote to memory of 716 2952 winmngr.exe 77 PID 2952 wrote to memory of 716 2952 winmngr.exe 77 PID 2952 wrote to memory of 716 2952 winmngr.exe 77 PID 2952 wrote to memory of 1440 2952 winmngr.exe 78 PID 2952 wrote to memory of 1440 2952 winmngr.exe 78 PID 2952 wrote to memory of 1440 2952 winmngr.exe 78 PID 2952 wrote to memory of 1440 2952 winmngr.exe 78 PID 2952 wrote to memory of 1440 2952 winmngr.exe 78 PID 2952 wrote to memory of 1440 2952 winmngr.exe 78 PID 2952 wrote to memory of 1440 2952 winmngr.exe 78 PID 2952 wrote to memory of 1440 2952 winmngr.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe"C:\Users\Admin\AppData\Local\Temp\e31c8cd9a69d71d4e988de583fc77fe970d7491a89df07611a46235afa8dbe68.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\is-ERMCO.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-ERMCO.tmp\setup.tmp" /SL5="$40118,8782861,270336,C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1640
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe" -n2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.lnk" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.lnk" /f4⤵
- Adds Run key to start application
PID:1208
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WdiService\winmngr.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:716
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-