Analysis
-
max time kernel
176s -
max time network
90s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 01:06
Static task
static1
Behavioral task
behavioral1
Sample
e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe
Resource
win10v2004-en-20220113
General
-
Target
e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe
-
Size
192KB
-
MD5
ce36b667dc2411b83ab678a66c42065a
-
SHA1
40a41587d785406e2d5c8b782492f18b8c034305
-
SHA256
e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf
-
SHA512
503f0fc072271880a13bb412eee27191e8d2f1d0af51daf5d4d55be6f33843f6427a0155e1600d447526147a7647e1c883853e30fe72a57904bd613af16104ff
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
Processes:
hhgsEmD.exepid process 1764 hhgsEmD.exe -
Loads dropped DLL 2 IoCs
Processes:
e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exepid process 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hhgsEmD.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exehhgsEmD.exepid process 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe 1764 hhgsEmD.exe 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe 1764 hhgsEmD.exe 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe 1764 hhgsEmD.exe 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exehhgsEmD.exedescription pid process Token: SeDebugPrivilege 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe Token: SeBackupPrivilege 1764 hhgsEmD.exe Token: SeBackupPrivilege 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exenet.exenet.exehhgsEmD.exenet.exenet.execmd.execmd.exenet.exedescription pid process target process PID 1480 wrote to memory of 1764 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe hhgsEmD.exe PID 1480 wrote to memory of 1764 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe hhgsEmD.exe PID 1480 wrote to memory of 1764 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe hhgsEmD.exe PID 1480 wrote to memory of 1764 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe hhgsEmD.exe PID 1480 wrote to memory of 1244 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe taskhost.exe PID 1480 wrote to memory of 1348 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe Dwm.exe PID 1480 wrote to memory of 860 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 860 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 860 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 860 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 860 wrote to memory of 1412 860 net.exe net1.exe PID 860 wrote to memory of 1412 860 net.exe net1.exe PID 860 wrote to memory of 1412 860 net.exe net1.exe PID 860 wrote to memory of 1412 860 net.exe net1.exe PID 1480 wrote to memory of 1128 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 1128 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 1128 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 1128 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1128 wrote to memory of 1780 1128 net.exe net1.exe PID 1128 wrote to memory of 1780 1128 net.exe net1.exe PID 1128 wrote to memory of 1780 1128 net.exe net1.exe PID 1128 wrote to memory of 1780 1128 net.exe net1.exe PID 1764 wrote to memory of 1928 1764 hhgsEmD.exe net.exe PID 1764 wrote to memory of 1928 1764 hhgsEmD.exe net.exe PID 1764 wrote to memory of 1928 1764 hhgsEmD.exe net.exe PID 1764 wrote to memory of 1928 1764 hhgsEmD.exe net.exe PID 1928 wrote to memory of 1756 1928 net.exe net1.exe PID 1928 wrote to memory of 1756 1928 net.exe net1.exe PID 1928 wrote to memory of 1756 1928 net.exe net1.exe PID 1928 wrote to memory of 1756 1928 net.exe net1.exe PID 1480 wrote to memory of 1560 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 1560 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 1560 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 1560 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1560 wrote to memory of 1924 1560 net.exe net1.exe PID 1560 wrote to memory of 1924 1560 net.exe net1.exe PID 1560 wrote to memory of 1924 1560 net.exe net1.exe PID 1560 wrote to memory of 1924 1560 net.exe net1.exe PID 1480 wrote to memory of 1068 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe cmd.exe PID 1480 wrote to memory of 1068 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe cmd.exe PID 1480 wrote to memory of 1068 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe cmd.exe PID 1480 wrote to memory of 1068 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe cmd.exe PID 1068 wrote to memory of 748 1068 cmd.exe reg.exe PID 1068 wrote to memory of 748 1068 cmd.exe reg.exe PID 1068 wrote to memory of 748 1068 cmd.exe reg.exe PID 1068 wrote to memory of 748 1068 cmd.exe reg.exe PID 1764 wrote to memory of 8612 1764 hhgsEmD.exe cmd.exe PID 1764 wrote to memory of 8612 1764 hhgsEmD.exe cmd.exe PID 1764 wrote to memory of 8612 1764 hhgsEmD.exe cmd.exe PID 1764 wrote to memory of 8612 1764 hhgsEmD.exe cmd.exe PID 8612 wrote to memory of 8640 8612 cmd.exe reg.exe PID 8612 wrote to memory of 8640 8612 cmd.exe reg.exe PID 8612 wrote to memory of 8640 8612 cmd.exe reg.exe PID 8612 wrote to memory of 8640 8612 cmd.exe reg.exe PID 1480 wrote to memory of 8904 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 8904 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 8904 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 1480 wrote to memory of 8904 1480 e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe net.exe PID 8904 wrote to memory of 8968 8904 net.exe net1.exe PID 8904 wrote to memory of 8968 8904 net.exe net1.exe PID 8904 wrote to memory of 8968 8904 net.exe net1.exe PID 8904 wrote to memory of 8968 8904 net.exe net1.exe PID 1764 wrote to memory of 9056 1764 hhgsEmD.exe net.exe PID 1764 wrote to memory of 9056 1764 hhgsEmD.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe"C:\Users\Admin\AppData\Local\Temp\e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\hhgsEmD.exe"C:\Users\Admin\AppData\Local\Temp\hhgsEmD.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:1756
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\hhgsEmD.exe" /f /reg:643⤵
- Suspicious use of WriteProcessMemory
PID:8612 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\hhgsEmD.exe" /f /reg:644⤵
- Adds Run key to start application
PID:8640 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:9056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:9080
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:36588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:36792
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1412
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1780
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1924
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe" /f /reg:642⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf.exe" /f /reg:643⤵
- Adds Run key to start application
PID:748 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8968
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:9144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:9168
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:30208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:30232
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:46428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:46452
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1348
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_bc8e1036-7fb3-448e-8ad9-a824b1a03b8e
MD593a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
MD5
06ddf83607ef401b0da501bf52e465d2
SHA195ac3505dda393d8c7ea2554f501abef019668c6
SHA256b591bc560b973bd59cb24aa04d9a5af3c3098aa7f7ef8a5504f16deb154644d8
SHA512bde16515f285edd3877341c0462f28edb534834f8545895b0195dbedc2e7b745a7ea355ff996c8ca1832898536632217c63c5a093af215030047123b67897c97
-
MD5
ce36b667dc2411b83ab678a66c42065a
SHA140a41587d785406e2d5c8b782492f18b8c034305
SHA256e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf
SHA512503f0fc072271880a13bb412eee27191e8d2f1d0af51daf5d4d55be6f33843f6427a0155e1600d447526147a7647e1c883853e30fe72a57904bd613af16104ff
-
MD5
ce36b667dc2411b83ab678a66c42065a
SHA140a41587d785406e2d5c8b782492f18b8c034305
SHA256e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf
SHA512503f0fc072271880a13bb412eee27191e8d2f1d0af51daf5d4d55be6f33843f6427a0155e1600d447526147a7647e1c883853e30fe72a57904bd613af16104ff
-
MD5
ce36b667dc2411b83ab678a66c42065a
SHA140a41587d785406e2d5c8b782492f18b8c034305
SHA256e33cc528ba4611636e7d1f52f634f46cb0fe9ae7e25250b04723452f994aaddf
SHA512503f0fc072271880a13bb412eee27191e8d2f1d0af51daf5d4d55be6f33843f6427a0155e1600d447526147a7647e1c883853e30fe72a57904bd613af16104ff