Analysis
-
max time kernel
163s -
max time network
170s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 00:56
Static task
static1
Behavioral task
behavioral1
Sample
d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe
Resource
win10-en-20211208
General
-
Target
d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe
-
Size
116KB
-
MD5
3e3f3a618c91d590d7518672821e54d3
-
SHA1
b4c731803b202d8f51d7fc07a3e05876e74d9d4e
-
SHA256
d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24
-
SHA512
9d256ff40ba95fca378e35e9acaf858312e8cdb6f709a8a9697cb9850095216758211985d00e28ac1704feff0c50af26cb5d293521e4538c598ee2559a70f017
Malware Config
Extracted
C:\ujy2fnt68t-readme.txt
ryuk
https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/961BDA7384510BB3
http://decryptor.cc/961BDA7384510BB3
https://filehippo.com/download_tor_browser_for_windows/
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\AssertUnregister.png => \??\c:\users\admin\pictures\AssertUnregister.png.ujy2fnt68t d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File renamed C:\Users\Admin\Pictures\ConvertToStep.png => \??\c:\users\admin\pictures\ConvertToStep.png.ujy2fnt68t d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File renamed C:\Users\Admin\Pictures\CopyEdit.tif => \??\c:\users\admin\pictures\CopyEdit.tif.ujy2fnt68t d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File renamed C:\Users\Admin\Pictures\CopyGet.tif => \??\c:\users\admin\pictures\CopyGet.tif.ujy2fnt68t d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File renamed C:\Users\Admin\Pictures\ResolveUnregister.crw => \??\c:\users\admin\pictures\ResolveUnregister.crw.ujy2fnt68t d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File renamed C:\Users\Admin\Pictures\UndoSend.png => \??\c:\users\admin\pictures\UndoSend.png.ujy2fnt68t d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\A: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\E: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\H: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\J: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\L: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\Q: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\V: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\X: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\F: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\I: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\K: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\N: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\S: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\T: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\U: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\Z: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\D: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\G: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\M: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\O: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\P: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\R: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\Y: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened (read-only) \??\B: d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ir96vz.bmp" d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File opened for modification \??\c:\program files\MoveReceive.xhtml d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\RequestDismount.emf d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\UpdateOpen.cr2 d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File created \??\c:\program files (x86)\ujy2fnt68t-readme.txt d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\ClearJoin.mp4 d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\ReceiveRestore.mht d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\WatchStep.eps d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\JoinRepair.svg d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\MergeBlock.i64 d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\ResolveDismount.wmv d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\ShowAdd.ini d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\UnlockSelect.pot d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\UnprotectRename.asf d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\WatchBackup.rar d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File created \??\c:\program files\ujy2fnt68t-readme.txt d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\ExportPush.rm d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe File opened for modification \??\c:\program files\GrantSave.svgz d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2804 d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe 2804 d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe 2804 d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe 2804 d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2804 d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe Token: SeTakeOwnershipPrivilege 2804 d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe Token: SeBackupPrivilege 1452 vssvc.exe Token: SeRestorePrivilege 1452 vssvc.exe Token: SeAuditPrivilege 1452 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe"C:\Users\Admin\AppData\Local\Temp\d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:528
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1452