Analysis
-
max time kernel
175s -
max time network
96s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 08:50
Static task
static1
Behavioral task
behavioral1
Sample
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe
Resource
win10v2004-en-20220113
General
-
Target
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe
-
Size
1.4MB
-
MD5
760cbfb1910baf7a2ab4e281c5c555b3
-
SHA1
cb77fbd21e24dd609f4f4de1cbefcb1f8f30aaf9
-
SHA256
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea
-
SHA512
ce35e5217e5513fe96d2ae1e579d5697f5a88cf4d3085352a41eae73ae75ea259c7e497e01a1265aaaf145afd7c62db6252cfaa0d7a395b5360ac4842c895739
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 744 vuFJF.exe -
Deletes itself 1 IoCs
pid Process 744 vuFJF.exe -
Loads dropped DLL 1 IoCs
pid Process 808 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\vuFJF.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_pt_BR.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-4 taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Vilnius taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.ibm.icu_52.1.0.v201404241930.jar taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Mendoza taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.sat4j.pb_2.3.5.v201404071733.jar taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\fr-FR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Monrovia taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\org.eclipse.equinox.p2.metadata.repository.prefs taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Stanley taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Efate taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPHandle.png taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Syowa taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\vlc.mo taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\host.luac taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlaceMCE.png taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\javafx-mx.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Sydney taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\epl-v10.html taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector.nl_ja_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\OpenRename.001 taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\vlc.mo taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-templates_zh_CN.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages.properties taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\zipfs.jar taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\cue.luac taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.THD taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Marquesas taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\layers.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToScenesBackground_PAL.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\startNetworkServer taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\zipfs.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Karachi taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\vlc.mo taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Danmarkshavn taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Chuuk taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\sa-jdi.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-text_ja.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_es.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-ui.xml taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Gaza taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui.zh_CN_5.5.0.165303.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Sitka taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\ado\msado21.tlb taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\softedges.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.extensionlocation.nl_zh_4.4.0.v20140623020002.jar taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 744 vuFJF.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 744 vuFJF.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 808 wrote to memory of 744 808 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe 27 PID 808 wrote to memory of 744 808 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe 27 PID 808 wrote to memory of 744 808 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe 27 PID 808 wrote to memory of 744 808 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe 27 PID 744 wrote to memory of 752 744 vuFJF.exe 28 PID 744 wrote to memory of 752 744 vuFJF.exe 28 PID 744 wrote to memory of 752 744 vuFJF.exe 28 PID 744 wrote to memory of 1144 744 vuFJF.exe 16 PID 744 wrote to memory of 1236 744 vuFJF.exe 15 PID 744 wrote to memory of 752 744 vuFJF.exe 28 PID 752 wrote to memory of 1940 752 cmd.exe 30 PID 752 wrote to memory of 1940 752 cmd.exe 30 PID 752 wrote to memory of 1940 752 cmd.exe 30
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1236
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops file in Program Files directory
PID:1144
-
C:\Users\Admin\AppData\Local\Temp\03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe"C:\Users\Admin\AppData\Local\Temp\03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\users\Public\vuFJF.exe"C:\users\Public\vuFJF.exe" C:\Users\Admin\AppData\Local\Temp\03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\vuFJF.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\vuFJF.exe" /f4⤵
- Adds Run key to start application
PID:1940
-
-
-