Analysis
-
max time kernel
165s -
max time network
141s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 00:43
Static task
static1
Behavioral task
behavioral1
Sample
eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe
Resource
win10v2004-en-20220112
General
-
Target
eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe
-
Size
182KB
-
MD5
e3a6a47d619dc38d039270dde995e1f8
-
SHA1
494a15923bd9b0c2410f8d44930da53c0aa97f6d
-
SHA256
eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a
-
SHA512
1868bcc3e263dc1d6a3f0c5f7232c4c75360fcac19895f6709cf126a42a396962c30228a47b8784b9dfb8ca634350c46511f85a8423bd4b4e94f6357f9f5f10f
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exepid process 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exedescription pid process Token: SeBackupPrivilege 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exenet.exenet.exenet.exenet.exedescription pid process target process PID 744 wrote to memory of 2088 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 2088 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 2088 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 2088 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 2156 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 2156 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 2156 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 2156 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 2088 wrote to memory of 2516 2088 net.exe net1.exe PID 2088 wrote to memory of 2516 2088 net.exe net1.exe PID 2088 wrote to memory of 2516 2088 net.exe net1.exe PID 2088 wrote to memory of 2516 2088 net.exe net1.exe PID 2156 wrote to memory of 2508 2156 net.exe net1.exe PID 2156 wrote to memory of 2508 2156 net.exe net1.exe PID 2156 wrote to memory of 2508 2156 net.exe net1.exe PID 2156 wrote to memory of 2508 2156 net.exe net1.exe PID 744 wrote to memory of 4852 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 4852 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 4852 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 4852 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 4852 wrote to memory of 4880 4852 net.exe net1.exe PID 4852 wrote to memory of 4880 4852 net.exe net1.exe PID 4852 wrote to memory of 4880 4852 net.exe net1.exe PID 4852 wrote to memory of 4880 4852 net.exe net1.exe PID 744 wrote to memory of 8492 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 8492 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 8492 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 744 wrote to memory of 8492 744 eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe net.exe PID 8492 wrote to memory of 8516 8492 net.exe net1.exe PID 8492 wrote to memory of 8516 8492 net.exe net1.exe PID 8492 wrote to memory of 8516 8492 net.exe net1.exe PID 8492 wrote to memory of 8516 8492 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe"C:\Users\Admin\AppData\Local\Temp\eb5b82d6f4b1150d3bb6a76102ab713ad05c2f4c2045bd53373e6fecae04f01a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2516
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2508
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4880
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8492 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8516