Analysis
-
max time kernel
177s -
max time network
144s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 01:56
Static task
static1
Behavioral task
behavioral1
Sample
d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe
Resource
win10v2004-en-20220113
General
-
Target
d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe
-
Size
193KB
-
MD5
12147c94f3211733f893d31d587d4ad6
-
SHA1
708199a9a86894f464ec5a5d607ffb1093c096f4
-
SHA256
d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849
-
SHA512
3ef68160f44d16e3a305899d537773fdaace5ae6534eb185f3741bc2917f84457674a8bd1ad7db0c4b707a308f101cb3d49f7906bde7732dd26ed08cf9f6b1af
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 1096 ehIwdrF.exe -
Loads dropped DLL 2 IoCs
pid Process 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 1096 ehIwdrF.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 1096 ehIwdrF.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe Token: SeBackupPrivilege 1096 ehIwdrF.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 956 wrote to memory of 1096 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 27 PID 956 wrote to memory of 1096 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 27 PID 956 wrote to memory of 1096 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 27 PID 956 wrote to memory of 1096 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 27 PID 956 wrote to memory of 2576 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 30 PID 956 wrote to memory of 2576 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 30 PID 956 wrote to memory of 2576 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 30 PID 956 wrote to memory of 2576 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 30 PID 956 wrote to memory of 2568 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 29 PID 956 wrote to memory of 2568 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 29 PID 956 wrote to memory of 2568 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 29 PID 956 wrote to memory of 2568 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 29 PID 1096 wrote to memory of 2628 1096 ehIwdrF.exe 33 PID 1096 wrote to memory of 2628 1096 ehIwdrF.exe 33 PID 1096 wrote to memory of 2628 1096 ehIwdrF.exe 33 PID 1096 wrote to memory of 2628 1096 ehIwdrF.exe 33 PID 1096 wrote to memory of 2712 1096 ehIwdrF.exe 35 PID 1096 wrote to memory of 2712 1096 ehIwdrF.exe 35 PID 1096 wrote to memory of 2712 1096 ehIwdrF.exe 35 PID 1096 wrote to memory of 2712 1096 ehIwdrF.exe 35 PID 956 wrote to memory of 2732 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 37 PID 956 wrote to memory of 2732 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 37 PID 956 wrote to memory of 2732 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 37 PID 956 wrote to memory of 2732 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 37 PID 956 wrote to memory of 2740 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 38 PID 956 wrote to memory of 2740 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 38 PID 956 wrote to memory of 2740 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 38 PID 956 wrote to memory of 2740 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 38 PID 2576 wrote to memory of 2944 2576 net.exe 45 PID 2576 wrote to memory of 2944 2576 net.exe 45 PID 2576 wrote to memory of 2944 2576 net.exe 45 PID 2576 wrote to memory of 2944 2576 net.exe 45 PID 2732 wrote to memory of 2936 2732 net.exe 46 PID 2732 wrote to memory of 2936 2732 net.exe 46 PID 2732 wrote to memory of 2936 2732 net.exe 46 PID 2732 wrote to memory of 2936 2732 net.exe 46 PID 2740 wrote to memory of 2928 2740 net.exe 43 PID 2740 wrote to memory of 2928 2740 net.exe 43 PID 2740 wrote to memory of 2928 2740 net.exe 43 PID 2740 wrote to memory of 2928 2740 net.exe 43 PID 2712 wrote to memory of 2960 2712 net.exe 42 PID 2712 wrote to memory of 2960 2712 net.exe 42 PID 2712 wrote to memory of 2960 2712 net.exe 42 PID 2712 wrote to memory of 2960 2712 net.exe 42 PID 2628 wrote to memory of 2968 2628 net.exe 44 PID 2628 wrote to memory of 2968 2628 net.exe 44 PID 2628 wrote to memory of 2968 2628 net.exe 44 PID 2628 wrote to memory of 2968 2628 net.exe 44 PID 2568 wrote to memory of 2952 2568 net.exe 47 PID 2568 wrote to memory of 2952 2568 net.exe 47 PID 2568 wrote to memory of 2952 2568 net.exe 47 PID 2568 wrote to memory of 2952 2568 net.exe 47 PID 956 wrote to memory of 36324 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 48 PID 956 wrote to memory of 36324 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 48 PID 956 wrote to memory of 36324 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 48 PID 956 wrote to memory of 36324 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 48 PID 956 wrote to memory of 36684 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 49 PID 956 wrote to memory of 36684 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 49 PID 956 wrote to memory of 36684 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 49 PID 956 wrote to memory of 36684 956 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 49 PID 36684 wrote to memory of 36272 36684 net.exe 53 PID 36684 wrote to memory of 36272 36684 net.exe 53 PID 36684 wrote to memory of 36272 36684 net.exe 53 PID 36684 wrote to memory of 36272 36684 net.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe"C:\Users\Admin\AppData\Local\Temp\d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\ehIwdrF.exe"C:\Users\Admin\AppData\Local\Temp\ehIwdrF.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵PID:2968
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:2960
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:37360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:37384
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2952
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2944
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2936
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2928
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:36324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:36040
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:36684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:36272
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:37284
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:37308
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:37320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:37348
-
-