Analysis
-
max time kernel
164s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19/02/2022, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe
Resource
win10v2004-en-20220112
General
-
Target
0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe
-
Size
170KB
-
MD5
b9d73fa0261bb6adaa2cb22f348518f0
-
SHA1
d52e7a4cb8ccad688572a8e5d38b43a0e38e3bc3
-
SHA256
0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4
-
SHA512
58e3f79e6de19df40b0992aa108e4022979e1c7b2be26e3dced26261c6ea800b89f1c00ac6e67340b4092cf3ada4a6c22c2aeb69eddba7838339a8c4e3799ff4
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\javaws.policy taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\cloud_Thumbnail.bmp taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\reflect.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\vignettemask25.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\plugin.jar taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\jmxremote.access taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrcommonlm.dat taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\1047x576_91n92.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\logging.properties taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Phoenix taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Regina taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.jpg taskhost.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\LINEAR_RGB.pf taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\New_York taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Pine_Lumber.jpg taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_zh_HK.properties taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi taskhost.exe File opened for modification C:\Program Files\Common Files\System\ado\msado21.tlb taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkClientCP taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref_PAL.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_selectionsubpicture.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\travel.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Recife taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\1047x576black.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToScenesBackground.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\blackbars60.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\PYCC.pf taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_sv.properties taskhost.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_matte.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\sysinfo.bat taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Havana taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\de-DE\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\720x480blacksquare.png taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derby.jar taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\NextMenuButtonIcon.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationLeft_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jni.h taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwresslm.dat taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Title_mainImage-mask.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\vintage.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\sRGB.pf taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\mainscroll.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToNotesBackground_PAL.wmv taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1752 0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1752 0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1636 1752 0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe 27 PID 1752 wrote to memory of 1636 1752 0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe 27 PID 1752 wrote to memory of 1636 1752 0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe 27 PID 1752 wrote to memory of 1252 1752 0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe 17 PID 1752 wrote to memory of 1360 1752 0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe 18 PID 1636 wrote to memory of 588 1636 cmd.exe 29 PID 1636 wrote to memory of 588 1636 cmd.exe 29 PID 1636 wrote to memory of 588 1636 cmd.exe 29 PID 1752 wrote to memory of 1636 1752 0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe 27
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops file in Program Files directory
PID:1252
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe"C:\Users\Admin\AppData\Local\Temp\0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\0280ccc8d6dbb14d79adf375fa386a534cd74b40c684ed47db0d2e4f659e4da4.exe" /f3⤵
- Adds Run key to start application
PID:588
-
-