Analysis
-
max time kernel
166s -
max time network
141s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 08:42
Static task
static1
Behavioral task
behavioral1
Sample
05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe
Resource
win10v2004-en-20220112
General
-
Target
05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe
-
Size
148KB
-
MD5
ff13e065cd7fe469f4aac4fcdcd55359
-
SHA1
b16de52db11a6cf5a60f3f6cde49a52a1370e9b4
-
SHA256
05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012
-
SHA512
f916e17a2cd09b617b9d660b6b8a021f759468c18df776674e48a171ef1615b7f3f545b5de1d9c70635a3a123a78fa55bc55a7e0ef05857c476bab0b633bb101
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14aJo5L9PTZhv8XX6qRPncbTXecb8Qohqb
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe" reg.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini taskhost.exe File opened for modification C:\Program Files\desktop.ini taskhost.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\720x480icongraphic.png taskhost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_selectionsubpicture.png taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsScenesBackground_PAL.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToScenesBackground_PAL.wmv taskhost.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols.xml taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\es-ES\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationUp_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Notes_loop_PAL.wmv taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-over-select.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationRight_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-image-mask.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\highlight.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\chapters-static.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_glass_Thumbnail.bmp taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToNotesBackground.wmv taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipshrv.xml taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Graph.emf taskhost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\babyblue.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-overlay.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_buttongraphic.png taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml taskhost.exe File opened for modification C:\Program Files\GetPop.js taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\NavigationButtonSubpicture.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-next-static.png taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrfrash.dat taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\babypink.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\pushplaysubpicture.png taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-highlight.png taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Memo.emf taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt taskhost.exe File opened for modification C:\Program Files\AssertFormat.ex_ taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\15x15dot.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-border.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-border.png taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 860 05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 860 05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 860 wrote to memory of 2032 860 05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe 27 PID 860 wrote to memory of 2032 860 05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe 27 PID 860 wrote to memory of 2032 860 05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe 27 PID 860 wrote to memory of 1256 860 05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe 19 PID 860 wrote to memory of 1360 860 05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe 20 PID 2032 wrote to memory of 316 2032 cmd.exe 29 PID 2032 wrote to memory of 316 2032 cmd.exe 29 PID 2032 wrote to memory of 316 2032 cmd.exe 29 PID 860 wrote to memory of 2032 860 05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe 27
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:1256
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe"C:\Users\Admin\AppData\Local\Temp\05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\05731714429349d9b4effbf0d1de415bc603c2c29803408f0cec4f02183d9012.exe" /f3⤵
- Adds Run key to start application
PID:316
-
-