Analysis
-
max time kernel
172s -
max time network
32s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 03:00
Static task
static1
Behavioral task
behavioral1
Sample
b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe
Resource
win10v2004-en-20220113
General
-
Target
b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe
-
Size
65KB
-
MD5
3e2ffab5f65572b6c3c2d6b060f9b3b5
-
SHA1
48a6f21c662003ddf0a2039ddce3d9f4a77737f0
-
SHA256
b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f
-
SHA512
3a16f8611d0b30a9db8452ad493214c0d5fcfd69ac043940d88f39e4baa2ad889e047d3d061ff86f23e04b82b15b247cabb2c991d9e8edd04232acfede3051c5
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref_PAL.wmv b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push.png b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\accessibility.properties b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-ui_ja.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-next-over-select.png b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG_PAL.wmv b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\RyukReadMe.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.nl_zh_4.4.0.v20140623020002.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-text.xml b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\psfont.properties.ja b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\jvm.lib b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\YST9 b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\uarrow.gif b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\MANIFEST.MF b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.commands.nl_zh_4.4.0.v20140623020002.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-next-static.png b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720x480icongraphic.png b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\calendars.properties b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\diagnostic-command-16.png b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.di.extensions_0.12.0.v20140417-2033.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.cpl b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\psfontj2d.properties b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\RyukReadMe.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector.nl_zh_4.4.0.v20140623020002.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\updater_ja.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeulm.dat b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_2.emf b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_SelectionSubpicture.png b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\RyukReadMe.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\colorcycle.png b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Cayman b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jerusalem b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Melbourne b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\RyukReadMe.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\RyukReadMe.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin_2.0.100.v20131209-2144.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_zh_CN.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\RyukReadMe.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Moscow b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Tijuana b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.directorywatcher.nl_ja_4.4.0.v20140623020002.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\RyukReadMe.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\RyukReadMe.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\conticon.gif b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\gimap.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup-impl_ja.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\RyukReadMe.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscsy.xml b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\full.png b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\charsets.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\South_Georgia b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Bucharest b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\toc.xml b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.text_3.9.1.v20140827-1810.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-common_zh_CN.jar b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\RyukReadMe.txt b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 316 b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 316 b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 316 wrote to memory of 688 316 b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe 28 PID 316 wrote to memory of 688 316 b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe 28 PID 316 wrote to memory of 688 316 b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe 28 PID 316 wrote to memory of 688 316 b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe 28 PID 316 wrote to memory of 1144 316 b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe 9 PID 688 wrote to memory of 1544 688 cmd.exe 31 PID 688 wrote to memory of 1544 688 cmd.exe 31 PID 688 wrote to memory of 1544 688 cmd.exe 31 PID 688 wrote to memory of 1544 688 cmd.exe 31 PID 316 wrote to memory of 1192 316 b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe 8
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe"C:\Users\Admin\AppData\Local\Temp\b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe" /f /reg:642⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\b5149d96cfbb0805e4ea55c8ca526eec6d44e953a48fb9027165156a51b9fb2f.exe" /f /reg:643⤵
- Adds Run key to start application
PID:1544
-
-