Analysis
-
max time kernel
170s -
max time network
87s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20/02/2022, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe
Resource
win10v2004-en-20220112
General
-
Target
f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe
-
Size
188KB
-
MD5
81a657edce1fc7c97e2e3367e676339f
-
SHA1
13a1686aaaba2c46792b468ca78f6f20a3817468
-
SHA256
f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682
-
SHA512
2233a938fa19a39d9052a2e339b18b140d9e258a9d3394219e60c636095566647faacba4ee72d007ade4c768cdece84b373f029bb19e53b3279e99f1204ee07e
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 592 AgjGlRj.exe -
Loads dropped DLL 2 IoCs
pid Process 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 592 AgjGlRj.exe 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 592 AgjGlRj.exe 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 592 AgjGlRj.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe Token: SeBackupPrivilege 592 AgjGlRj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 592 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 27 PID 1220 wrote to memory of 592 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 27 PID 1220 wrote to memory of 592 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 27 PID 1220 wrote to memory of 592 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 27 PID 1220 wrote to memory of 988 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 28 PID 1220 wrote to memory of 988 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 28 PID 1220 wrote to memory of 988 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 28 PID 1220 wrote to memory of 988 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 28 PID 1220 wrote to memory of 1328 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 30 PID 1220 wrote to memory of 1328 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 30 PID 1220 wrote to memory of 1328 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 30 PID 1220 wrote to memory of 1328 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 30 PID 1220 wrote to memory of 1472 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 32 PID 1220 wrote to memory of 1472 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 32 PID 1220 wrote to memory of 1472 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 32 PID 1220 wrote to memory of 1472 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 32 PID 1328 wrote to memory of 876 1328 net.exe 35 PID 1328 wrote to memory of 876 1328 net.exe 35 PID 1328 wrote to memory of 876 1328 net.exe 35 PID 1328 wrote to memory of 876 1328 net.exe 35 PID 988 wrote to memory of 1940 988 net.exe 36 PID 988 wrote to memory of 1940 988 net.exe 36 PID 988 wrote to memory of 1940 988 net.exe 36 PID 988 wrote to memory of 1940 988 net.exe 36 PID 1472 wrote to memory of 1780 1472 net.exe 34 PID 1472 wrote to memory of 1780 1472 net.exe 34 PID 1472 wrote to memory of 1780 1472 net.exe 34 PID 1472 wrote to memory of 1780 1472 net.exe 34 PID 1220 wrote to memory of 956 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 37 PID 1220 wrote to memory of 956 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 37 PID 1220 wrote to memory of 956 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 37 PID 1220 wrote to memory of 956 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 37 PID 956 wrote to memory of 1552 956 net.exe 39 PID 956 wrote to memory of 1552 956 net.exe 39 PID 956 wrote to memory of 1552 956 net.exe 39 PID 956 wrote to memory of 1552 956 net.exe 39 PID 592 wrote to memory of 2168 592 AgjGlRj.exe 40 PID 592 wrote to memory of 2168 592 AgjGlRj.exe 40 PID 592 wrote to memory of 2168 592 AgjGlRj.exe 40 PID 592 wrote to memory of 2168 592 AgjGlRj.exe 40 PID 2168 wrote to memory of 2192 2168 net.exe 42 PID 2168 wrote to memory of 2192 2168 net.exe 42 PID 2168 wrote to memory of 2192 2168 net.exe 42 PID 2168 wrote to memory of 2192 2168 net.exe 42 PID 1220 wrote to memory of 8640 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 45 PID 1220 wrote to memory of 8640 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 45 PID 1220 wrote to memory of 8640 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 45 PID 1220 wrote to memory of 8640 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 45 PID 8640 wrote to memory of 8664 8640 net.exe 47 PID 8640 wrote to memory of 8664 8640 net.exe 47 PID 8640 wrote to memory of 8664 8640 net.exe 47 PID 8640 wrote to memory of 8664 8640 net.exe 47 PID 1220 wrote to memory of 8676 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 48 PID 1220 wrote to memory of 8676 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 48 PID 1220 wrote to memory of 8676 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 48 PID 1220 wrote to memory of 8676 1220 f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe 48 PID 8676 wrote to memory of 8700 8676 net.exe 50 PID 8676 wrote to memory of 8700 8676 net.exe 50 PID 8676 wrote to memory of 8700 8676 net.exe 50 PID 8676 wrote to memory of 8700 8676 net.exe 50 PID 592 wrote to memory of 8716 592 AgjGlRj.exe 51 PID 592 wrote to memory of 8716 592 AgjGlRj.exe 51 PID 592 wrote to memory of 8716 592 AgjGlRj.exe 51 PID 592 wrote to memory of 8716 592 AgjGlRj.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe"C:\Users\Admin\AppData\Local\Temp\f63501542310745baa8fa2026930590cd690b53bfddb940378eca685a2c5e682.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\AgjGlRj.exe"C:\Users\Admin\AppData\Local\Temp\AgjGlRj.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:2192
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:8716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:8740
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:36480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:36504
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1940
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:876
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1780
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1552
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8664
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8676 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8700
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:36400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:36424
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:36440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:36468
-
-