Analysis
-
max time kernel
175s -
max time network
96s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 08:50
Static task
static1
Behavioral task
behavioral1
Sample
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe
Resource
win10v2004-en-20220113
General
-
Target
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe
-
Size
1.4MB
-
MD5
760cbfb1910baf7a2ab4e281c5c555b3
-
SHA1
cb77fbd21e24dd609f4f4de1cbefcb1f8f30aaf9
-
SHA256
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea
-
SHA512
ce35e5217e5513fe96d2ae1e579d5697f5a88cf4d3085352a41eae73ae75ea259c7e497e01a1265aaaf145afd7c62db6252cfaa0d7a395b5360ac4842c895739
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
Processes:
vuFJF.exepid process 744 vuFJF.exe -
Deletes itself 1 IoCs
Processes:
vuFJF.exepid process 744 vuFJF.exe -
Loads dropped DLL 1 IoCs
Processes:
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exepid process 808 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\vuFJF.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
taskhost.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_pt_BR.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-4 taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Vilnius taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.ibm.icu_52.1.0.v201404241930.jar taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Mendoza taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.sat4j.pb_2.3.5.v201404071733.jar taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\fr-FR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Monrovia taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\org.eclipse.equinox.p2.metadata.repository.prefs taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Stanley taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Efate taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPHandle.png taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Syowa taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\vlc.mo taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\host.luac taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlaceMCE.png taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\javafx-mx.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Sydney taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\epl-v10.html taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector.nl_ja_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\OpenRename.001 taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\vlc.mo taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-templates_zh_CN.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages.properties taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\zipfs.jar taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\cue.luac taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.THD taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Marquesas taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\layers.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToScenesBackground_PAL.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\startNetworkServer taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\zipfs.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Karachi taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\vlc.mo taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Danmarkshavn taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Chuuk taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\sa-jdi.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-text_ja.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_es.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-ui.xml taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Gaza taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui.zh_CN_5.5.0.165303.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Sitka taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\ado\msado21.tlb taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\softedges.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.extensionlocation.nl_zh_4.4.0.v20140623020002.jar taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
vuFJF.exepid process 744 vuFJF.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vuFJF.exedescription pid process Token: SeDebugPrivilege 744 vuFJF.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exevuFJF.execmd.exedescription pid process target process PID 808 wrote to memory of 744 808 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe vuFJF.exe PID 808 wrote to memory of 744 808 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe vuFJF.exe PID 808 wrote to memory of 744 808 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe vuFJF.exe PID 808 wrote to memory of 744 808 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe vuFJF.exe PID 744 wrote to memory of 752 744 vuFJF.exe cmd.exe PID 744 wrote to memory of 752 744 vuFJF.exe cmd.exe PID 744 wrote to memory of 752 744 vuFJF.exe cmd.exe PID 744 wrote to memory of 1144 744 vuFJF.exe taskhost.exe PID 744 wrote to memory of 1236 744 vuFJF.exe Dwm.exe PID 744 wrote to memory of 752 744 vuFJF.exe cmd.exe PID 752 wrote to memory of 1940 752 cmd.exe reg.exe PID 752 wrote to memory of 1940 752 cmd.exe reg.exe PID 752 wrote to memory of 1940 752 cmd.exe reg.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1236
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops file in Program Files directory
PID:1144
-
C:\Users\Admin\AppData\Local\Temp\03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe"C:\Users\Admin\AppData\Local\Temp\03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\users\Public\vuFJF.exe"C:\users\Public\vuFJF.exe" C:\Users\Admin\AppData\Local\Temp\03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\vuFJF.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\vuFJF.exe" /f4⤵
- Adds Run key to start application
PID:1940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
31bd0f224e7e74eee2847f43aae23974
SHA192e331e1e8ad30538f38dd7ba31386afafa14a58
SHA2568b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d
SHA512a13f05a12b084ef425f542ff4be824bbccb5dbdfe085af8b7e19d81a6bcba4b8c1debcc38f6b57bc9265a4db21eed70852ece8cc62b3ef14c47fca3035a55249
-
MD5
31bd0f224e7e74eee2847f43aae23974
SHA192e331e1e8ad30538f38dd7ba31386afafa14a58
SHA2568b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d
SHA512a13f05a12b084ef425f542ff4be824bbccb5dbdfe085af8b7e19d81a6bcba4b8c1debcc38f6b57bc9265a4db21eed70852ece8cc62b3ef14c47fca3035a55249