Analysis
-
max time kernel
199s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 01:56
Static task
static1
Behavioral task
behavioral1
Sample
d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe
Resource
win10v2004-en-20220113
General
-
Target
d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe
-
Size
193KB
-
MD5
12147c94f3211733f893d31d587d4ad6
-
SHA1
708199a9a86894f464ec5a5d607ffb1093c096f4
-
SHA256
d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849
-
SHA512
3ef68160f44d16e3a305899d537773fdaace5ae6534eb185f3741bc2917f84457674a8bd1ad7db0c4b707a308f101cb3d49f7906bde7732dd26ed08cf9f6b1af
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 3108 ZZKMIQJ.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation ZZKMIQJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 3108 ZZKMIQJ.exe 3108 ZZKMIQJ.exe 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 3108 ZZKMIQJ.exe 3108 ZZKMIQJ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe Token: SeBackupPrivilege 3108 ZZKMIQJ.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1292 wrote to memory of 3108 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 85 PID 1292 wrote to memory of 3108 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 85 PID 1292 wrote to memory of 3108 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 85 PID 1292 wrote to memory of 4380 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 86 PID 1292 wrote to memory of 4380 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 86 PID 1292 wrote to memory of 4380 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 86 PID 1292 wrote to memory of 3368 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 88 PID 1292 wrote to memory of 3368 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 88 PID 1292 wrote to memory of 3368 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 88 PID 4380 wrote to memory of 1392 4380 net.exe 90 PID 4380 wrote to memory of 1392 4380 net.exe 90 PID 4380 wrote to memory of 1392 4380 net.exe 90 PID 3368 wrote to memory of 816 3368 net.exe 91 PID 3368 wrote to memory of 816 3368 net.exe 91 PID 3368 wrote to memory of 816 3368 net.exe 91 PID 1292 wrote to memory of 4832 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 92 PID 1292 wrote to memory of 4832 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 92 PID 1292 wrote to memory of 4832 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 92 PID 4832 wrote to memory of 2948 4832 net.exe 94 PID 4832 wrote to memory of 2948 4832 net.exe 94 PID 4832 wrote to memory of 2948 4832 net.exe 94 PID 1292 wrote to memory of 4824 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 95 PID 1292 wrote to memory of 4824 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 95 PID 1292 wrote to memory of 4824 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 95 PID 4824 wrote to memory of 3896 4824 net.exe 97 PID 4824 wrote to memory of 3896 4824 net.exe 97 PID 4824 wrote to memory of 3896 4824 net.exe 97 PID 3108 wrote to memory of 3536 3108 ZZKMIQJ.exe 98 PID 3108 wrote to memory of 3536 3108 ZZKMIQJ.exe 98 PID 3108 wrote to memory of 3536 3108 ZZKMIQJ.exe 98 PID 3108 wrote to memory of 2132 3108 ZZKMIQJ.exe 100 PID 3108 wrote to memory of 2132 3108 ZZKMIQJ.exe 100 PID 3108 wrote to memory of 2132 3108 ZZKMIQJ.exe 100 PID 3536 wrote to memory of 4644 3536 net.exe 102 PID 3536 wrote to memory of 4644 3536 net.exe 102 PID 3536 wrote to memory of 4644 3536 net.exe 102 PID 2132 wrote to memory of 4728 2132 net.exe 103 PID 2132 wrote to memory of 4728 2132 net.exe 103 PID 2132 wrote to memory of 4728 2132 net.exe 103 PID 1292 wrote to memory of 12172 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 108 PID 1292 wrote to memory of 12172 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 108 PID 1292 wrote to memory of 12172 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 108 PID 1292 wrote to memory of 12180 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 105 PID 1292 wrote to memory of 12180 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 105 PID 1292 wrote to memory of 12180 1292 d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe 105 PID 12172 wrote to memory of 12268 12172 net.exe 110 PID 12172 wrote to memory of 12268 12172 net.exe 110 PID 12180 wrote to memory of 12272 12180 net.exe 109 PID 12172 wrote to memory of 12268 12172 net.exe 110 PID 12180 wrote to memory of 12272 12180 net.exe 109 PID 12180 wrote to memory of 12272 12180 net.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe"C:\Users\Admin\AppData\Local\Temp\d7b324dfead641207c85cb18cdfc00bbfd37932f27f41c3af441d6912f235849.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\ZZKMIQJ.exe"C:\Users\Admin\AppData\Local\Temp\ZZKMIQJ.exe" 8 LAN2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵PID:4644
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:4728
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1392
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:816
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2948
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:3896
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:12180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:12272
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:12172 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:12268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3108 -ip 31081⤵PID:11376