Analysis
-
max time kernel
165s -
max time network
137s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 01:38
Static task
static1
Behavioral task
behavioral1
Sample
d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe
Resource
win10v2004-en-20220112
General
-
Target
d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe
-
Size
188KB
-
MD5
28b6df2007a3b33b43a13ab518f2947d
-
SHA1
7ea40bac1432c34736bd0cce346d8f9b983c627b
-
SHA256
d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82
-
SHA512
e851fae2a441a1b0814d4725ea288875cd44229573449eddff2af1db66433d27461edf246a6f9ce01a32025985f008c0b6a0ada134aaaf2020b8f8d2ce683f58
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 268 OxYFABS.exe -
Loads dropped DLL 2 IoCs
pid Process 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 268 OxYFABS.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 268 OxYFABS.exe 268 OxYFABS.exe 268 OxYFABS.exe 268 OxYFABS.exe 268 OxYFABS.exe 268 OxYFABS.exe 268 OxYFABS.exe 268 OxYFABS.exe 268 OxYFABS.exe 268 OxYFABS.exe 268 OxYFABS.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 268 OxYFABS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe Token: SeBackupPrivilege 268 OxYFABS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 268 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 27 PID 624 wrote to memory of 268 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 27 PID 624 wrote to memory of 268 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 27 PID 624 wrote to memory of 268 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 27 PID 624 wrote to memory of 1644 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 28 PID 624 wrote to memory of 1644 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 28 PID 624 wrote to memory of 1644 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 28 PID 624 wrote to memory of 1644 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 28 PID 624 wrote to memory of 1292 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 31 PID 624 wrote to memory of 1292 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 31 PID 624 wrote to memory of 1292 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 31 PID 624 wrote to memory of 1292 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 31 PID 268 wrote to memory of 1376 268 OxYFABS.exe 30 PID 268 wrote to memory of 1376 268 OxYFABS.exe 30 PID 268 wrote to memory of 1376 268 OxYFABS.exe 30 PID 268 wrote to memory of 1376 268 OxYFABS.exe 30 PID 624 wrote to memory of 1864 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 34 PID 624 wrote to memory of 1864 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 34 PID 624 wrote to memory of 1864 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 34 PID 624 wrote to memory of 1864 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 34 PID 268 wrote to memory of 976 268 OxYFABS.exe 36 PID 268 wrote to memory of 976 268 OxYFABS.exe 36 PID 268 wrote to memory of 976 268 OxYFABS.exe 36 PID 268 wrote to memory of 976 268 OxYFABS.exe 36 PID 624 wrote to memory of 1056 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 38 PID 624 wrote to memory of 1056 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 38 PID 624 wrote to memory of 1056 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 38 PID 624 wrote to memory of 1056 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 38 PID 1056 wrote to memory of 2188 1056 net.exe 43 PID 1056 wrote to memory of 2188 1056 net.exe 43 PID 1056 wrote to memory of 2188 1056 net.exe 43 PID 1056 wrote to memory of 2188 1056 net.exe 43 PID 1292 wrote to memory of 2164 1292 net.exe 42 PID 1292 wrote to memory of 2164 1292 net.exe 42 PID 1292 wrote to memory of 2164 1292 net.exe 42 PID 1292 wrote to memory of 2164 1292 net.exe 42 PID 1864 wrote to memory of 2172 1864 net.exe 41 PID 1864 wrote to memory of 2172 1864 net.exe 41 PID 1864 wrote to memory of 2172 1864 net.exe 41 PID 1864 wrote to memory of 2172 1864 net.exe 41 PID 1376 wrote to memory of 2180 1376 net.exe 40 PID 1376 wrote to memory of 2180 1376 net.exe 40 PID 1376 wrote to memory of 2180 1376 net.exe 40 PID 1376 wrote to memory of 2180 1376 net.exe 40 PID 1644 wrote to memory of 2196 1644 net.exe 44 PID 1644 wrote to memory of 2196 1644 net.exe 44 PID 1644 wrote to memory of 2196 1644 net.exe 44 PID 1644 wrote to memory of 2196 1644 net.exe 44 PID 976 wrote to memory of 2204 976 net.exe 45 PID 976 wrote to memory of 2204 976 net.exe 45 PID 976 wrote to memory of 2204 976 net.exe 45 PID 976 wrote to memory of 2204 976 net.exe 45 PID 624 wrote to memory of 34472 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 48 PID 624 wrote to memory of 34472 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 48 PID 624 wrote to memory of 34472 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 48 PID 624 wrote to memory of 34472 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 48 PID 34472 wrote to memory of 34348 34472 net.exe 50 PID 34472 wrote to memory of 34348 34472 net.exe 50 PID 34472 wrote to memory of 34348 34472 net.exe 50 PID 34472 wrote to memory of 34348 34472 net.exe 50 PID 624 wrote to memory of 35576 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 51 PID 624 wrote to memory of 35576 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 51 PID 624 wrote to memory of 35576 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 51 PID 624 wrote to memory of 35576 624 d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe"C:\Users\Admin\AppData\Local\Temp\d29d9915be6d41e899cec8593a36bf55acf63a1d574c65d7562898dab6dafa82.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\OxYFABS.exe"C:\Users\Admin\AppData\Local\Temp\OxYFABS.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵PID:2180
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:2204
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:2224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:1688
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2196
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2164
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2172
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2188
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:34472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:34348
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:35576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:35584
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:38692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:38740
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2008
-
-