Analysis
-
max time kernel
170s -
max time network
144s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 03:32
Static task
static1
Behavioral task
behavioral1
Sample
a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe
Resource
win10v2004-en-20220112
General
-
Target
a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe
-
Size
168KB
-
MD5
966251a415b5abbf2d4b9699abde3fe8
-
SHA1
e63c35c79badc0a6846ed33a9f30eeda66698350
-
SHA256
a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672
-
SHA512
d47b1ab889550af3bb826fefedb9164f6670269897bb02f01f970fb6e8b32d26c464fa3e0a2771257b2dd3cc5652665796c3aa5a2f326dc528fa30d89f244886
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exepid process 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exedescription pid process Token: SeBackupPrivilege 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1472 wrote to memory of 2636 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 2636 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 2636 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 2636 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 2764 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 2764 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 2764 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 2764 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 2764 wrote to memory of 5612 2764 net.exe net1.exe PID 2764 wrote to memory of 5612 2764 net.exe net1.exe PID 2764 wrote to memory of 5612 2764 net.exe net1.exe PID 2764 wrote to memory of 5612 2764 net.exe net1.exe PID 2636 wrote to memory of 5604 2636 net.exe net1.exe PID 2636 wrote to memory of 5604 2636 net.exe net1.exe PID 2636 wrote to memory of 5604 2636 net.exe net1.exe PID 2636 wrote to memory of 5604 2636 net.exe net1.exe PID 1472 wrote to memory of 8768 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 8768 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 8768 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 8768 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 8768 wrote to memory of 8792 8768 net.exe net1.exe PID 8768 wrote to memory of 8792 8768 net.exe net1.exe PID 8768 wrote to memory of 8792 8768 net.exe net1.exe PID 8768 wrote to memory of 8792 8768 net.exe net1.exe PID 1472 wrote to memory of 16788 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 16788 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 16788 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 1472 wrote to memory of 16788 1472 a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe net.exe PID 16788 wrote to memory of 16812 16788 net.exe net1.exe PID 16788 wrote to memory of 16812 16788 net.exe net1.exe PID 16788 wrote to memory of 16812 16788 net.exe net1.exe PID 16788 wrote to memory of 16812 16788 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe"C:\Users\Admin\AppData\Local\Temp\a90285e58fd49c1ae1cbf50f7f37438b12aa08b61e52a1f612e6cf9863d18672.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:5604
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:5612
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8792
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:16788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:16812