Analysis
-
max time kernel
179s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 02:51
Static task
static1
Behavioral task
behavioral1
Sample
b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe
Resource
win10v2004-en-20220113
General
-
Target
b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe
-
Size
168KB
-
MD5
26ffd8020e1ce334c259ff92457c8d66
-
SHA1
c62df79f5e481720ecd3d835d476f246759e6149
-
SHA256
b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32
-
SHA512
9731d30073c293f20d50f9202c1b5266bbd13f6a2c77794b0e5fbb3765a01bd807a327063edf36533c880b0da4d57e4b8d99518e34f559453f83889ec21f6de5
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exepid process 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exedescription pid process Token: SeDebugPrivilege 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe Token: SeBackupPrivilege 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1608 wrote to memory of 1276 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe taskhost.exe PID 1608 wrote to memory of 1372 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe Dwm.exe PID 1608 wrote to memory of 1692 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 1692 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 1692 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 1692 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1692 wrote to memory of 1132 1692 net.exe net1.exe PID 1692 wrote to memory of 1132 1692 net.exe net1.exe PID 1692 wrote to memory of 1132 1692 net.exe net1.exe PID 1692 wrote to memory of 1132 1692 net.exe net1.exe PID 1608 wrote to memory of 812 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 812 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 812 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 812 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 812 wrote to memory of 1996 812 net.exe net1.exe PID 812 wrote to memory of 1996 812 net.exe net1.exe PID 812 wrote to memory of 1996 812 net.exe net1.exe PID 812 wrote to memory of 1996 812 net.exe net1.exe PID 1608 wrote to memory of 1620 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 1620 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 1620 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 1620 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1620 wrote to memory of 2128 1620 net.exe net1.exe PID 1620 wrote to memory of 2128 1620 net.exe net1.exe PID 1620 wrote to memory of 2128 1620 net.exe net1.exe PID 1620 wrote to memory of 2128 1620 net.exe net1.exe PID 1608 wrote to memory of 9324 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 9324 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 9324 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 9324 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 9324 wrote to memory of 9348 9324 net.exe net1.exe PID 9324 wrote to memory of 9348 9324 net.exe net1.exe PID 9324 wrote to memory of 9348 9324 net.exe net1.exe PID 9324 wrote to memory of 9348 9324 net.exe net1.exe PID 1608 wrote to memory of 9392 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 9392 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 9392 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 9392 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 9392 wrote to memory of 9420 9392 net.exe net1.exe PID 9392 wrote to memory of 9420 9392 net.exe net1.exe PID 9392 wrote to memory of 9420 9392 net.exe net1.exe PID 9392 wrote to memory of 9420 9392 net.exe net1.exe PID 1608 wrote to memory of 16520 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 16520 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 16520 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 16520 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 16520 wrote to memory of 16544 16520 net.exe net1.exe PID 16520 wrote to memory of 16544 16520 net.exe net1.exe PID 16520 wrote to memory of 16544 16520 net.exe net1.exe PID 16520 wrote to memory of 16544 16520 net.exe net1.exe PID 1608 wrote to memory of 25644 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 25644 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 25644 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 1608 wrote to memory of 25644 1608 b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe net.exe PID 25644 wrote to memory of 25668 25644 net.exe net1.exe PID 25644 wrote to memory of 25668 25644 net.exe net1.exe PID 25644 wrote to memory of 25668 25644 net.exe net1.exe PID 25644 wrote to memory of 25668 25644 net.exe net1.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe"C:\Users\Admin\AppData\Local\Temp\b7dbb846d30fbd8d2d35171ae1e5df9eb7c8b5ad53e6cfaf4f6b5c08e3d5cc32.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵