Analysis
-
max time kernel
171s -
max time network
143s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 08:33
Static task
static1
Behavioral task
behavioral1
Sample
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe
Resource
win10v2004-en-20220112
General
-
Target
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe
-
Size
192KB
-
MD5
38df8a5c21f7df368490f8a0a0e276f9
-
SHA1
564641f0da5a9365a748a9589535f3b9439e5cc9
-
SHA256
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c
-
SHA512
2d3aaabd9f2d1fc4438ff31717dd53667b16acfa421c0364374135ed41360a1dee78d8f51ae588017c895c192f031bf13cbbaa67b1d240ddd86025ebc06be2cf
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
Processes:
FYqNGGm.exepid process 648 FYqNGGm.exe -
Loads dropped DLL 2 IoCs
Processes:
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exepid process 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exeFYqNGGm.exepid process 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 648 FYqNGGm.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 648 FYqNGGm.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe 648 FYqNGGm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exeFYqNGGm.exedescription pid process Token: SeBackupPrivilege 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe Token: SeBackupPrivilege 648 FYqNGGm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exeFYqNGGm.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1624 wrote to memory of 648 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe FYqNGGm.exe PID 1624 wrote to memory of 648 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe FYqNGGm.exe PID 1624 wrote to memory of 648 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe FYqNGGm.exe PID 1624 wrote to memory of 648 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe FYqNGGm.exe PID 648 wrote to memory of 1580 648 FYqNGGm.exe net.exe PID 648 wrote to memory of 1580 648 FYqNGGm.exe net.exe PID 648 wrote to memory of 1580 648 FYqNGGm.exe net.exe PID 648 wrote to memory of 1580 648 FYqNGGm.exe net.exe PID 1624 wrote to memory of 1700 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 1700 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 1700 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 1700 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 1292 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 1292 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 1292 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 1292 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 2076 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 2076 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 2076 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 2076 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 2092 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 2092 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 2092 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 2092 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 648 wrote to memory of 2100 648 FYqNGGm.exe net.exe PID 648 wrote to memory of 2100 648 FYqNGGm.exe net.exe PID 648 wrote to memory of 2100 648 FYqNGGm.exe net.exe PID 648 wrote to memory of 2100 648 FYqNGGm.exe net.exe PID 1580 wrote to memory of 2524 1580 net.exe net1.exe PID 1580 wrote to memory of 2524 1580 net.exe net1.exe PID 1580 wrote to memory of 2524 1580 net.exe net1.exe PID 1580 wrote to memory of 2524 1580 net.exe net1.exe PID 1700 wrote to memory of 2532 1700 net.exe net1.exe PID 2100 wrote to memory of 2540 2100 net.exe net1.exe PID 1700 wrote to memory of 2532 1700 net.exe net1.exe PID 1700 wrote to memory of 2532 1700 net.exe net1.exe PID 2100 wrote to memory of 2540 2100 net.exe net1.exe PID 1700 wrote to memory of 2532 1700 net.exe net1.exe PID 2100 wrote to memory of 2540 2100 net.exe net1.exe PID 2100 wrote to memory of 2540 2100 net.exe net1.exe PID 2092 wrote to memory of 2556 2092 net.exe net1.exe PID 2092 wrote to memory of 2556 2092 net.exe net1.exe PID 2092 wrote to memory of 2556 2092 net.exe net1.exe PID 2092 wrote to memory of 2556 2092 net.exe net1.exe PID 1292 wrote to memory of 2548 1292 net.exe net1.exe PID 1292 wrote to memory of 2548 1292 net.exe net1.exe PID 1292 wrote to memory of 2548 1292 net.exe net1.exe PID 1292 wrote to memory of 2548 1292 net.exe net1.exe PID 2076 wrote to memory of 2564 2076 net.exe net1.exe PID 2076 wrote to memory of 2564 2076 net.exe net1.exe PID 2076 wrote to memory of 2564 2076 net.exe net1.exe PID 2076 wrote to memory of 2564 2076 net.exe net1.exe PID 1624 wrote to memory of 22768 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 22768 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 22768 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 22768 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 22760 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 22760 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 22760 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 1624 wrote to memory of 22760 1624 08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe net.exe PID 22760 wrote to memory of 22812 22760 net.exe net1.exe PID 22760 wrote to memory of 22812 22760 net.exe net1.exe PID 22760 wrote to memory of 22812 22760 net.exe net1.exe PID 22760 wrote to memory of 22812 22760 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe"C:\Users\Admin\AppData\Local\Temp\08577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FYqNGGm.exe"C:\Users\Admin\AppData\Local\Temp\FYqNGGm.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2329389628-4064185017-3901522362-1000\08e575673cce10c72090304839888e02_3bd845b8-ce6a-4337-9974-31490196462aMD5
d5547d0b7ac270369e7ba33d1908dd8c
SHA1173325c61b89559fbd13979b8e70513b5eb8b8b0
SHA25690f75246c78cd00186f32764120cf51a60ba4c3039de41273aba82562dc52768
SHA512eecc964b1e6cf4d2a8123ef76e053b9976999549b7f5aa6871d7a7a5ab8d9c0cbb465ac70c4c111adcf52f081e07e7b620fbcee6d9efe10ac2c8c1ffaebe2619
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_3bd845b8-ce6a-4337-9974-31490196462aMD5
93a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
C:\Users\Admin\AppData\Local\Temp\FYqNGGm.exeMD5
38df8a5c21f7df368490f8a0a0e276f9
SHA1564641f0da5a9365a748a9589535f3b9439e5cc9
SHA25608577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c
SHA5122d3aaabd9f2d1fc4438ff31717dd53667b16acfa421c0364374135ed41360a1dee78d8f51ae588017c895c192f031bf13cbbaa67b1d240ddd86025ebc06be2cf
-
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.htmlMD5
9207bc35d851e473f9a1b245be0fbda0
SHA10346b460e5039afc7e0575ec5de40d45e15ca5a4
SHA256e6ffa7f66d227958059162ac149e4c6d841afbdf7f52c6cf24d9dc2150485c24
SHA5124491d89e47080cf5903ccd0937ad74484d3226553f828fa4acf3816d08ce4508b0123f3e1114cbf02665463d7bd67688673f0c01ac86edf05bc45decbd699f05
-
\Users\Admin\AppData\Local\Temp\FYqNGGm.exeMD5
38df8a5c21f7df368490f8a0a0e276f9
SHA1564641f0da5a9365a748a9589535f3b9439e5cc9
SHA25608577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c
SHA5122d3aaabd9f2d1fc4438ff31717dd53667b16acfa421c0364374135ed41360a1dee78d8f51ae588017c895c192f031bf13cbbaa67b1d240ddd86025ebc06be2cf
-
\Users\Admin\AppData\Local\Temp\FYqNGGm.exeMD5
38df8a5c21f7df368490f8a0a0e276f9
SHA1564641f0da5a9365a748a9589535f3b9439e5cc9
SHA25608577e8c9d1c872af3ff503b0b1d60c378d841679fc7f6b3ce48affad6bc781c
SHA5122d3aaabd9f2d1fc4438ff31717dd53667b16acfa421c0364374135ed41360a1dee78d8f51ae588017c895c192f031bf13cbbaa67b1d240ddd86025ebc06be2cf
-
memory/1624-55-0x0000000076641000-0x0000000076643000-memory.dmpFilesize
8KB