Analysis
-
max time kernel
227s -
max time network
242s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 03:18
Static task
static1
Behavioral task
behavioral1
Sample
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe
Resource
win10v2004-en-20220113
General
-
Target
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe
-
Size
191KB
-
MD5
856961d44f9e6775ad573cf58c438a2a
-
SHA1
818bbf02fd1bd0eda9ee62c73b63266bf859e699
-
SHA256
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c
-
SHA512
d6bfb664f6a1496df539c86a9b2b2b1bf3d43e252109af2f3e9dc40b566804e0b6d8ef051f953ea998391664ce8db8ea2dc5b2b4199493082e473c9b196ebc0e
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
Processes:
UyLcPnD.exepid process 2176 UyLcPnD.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exeUyLcPnD.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation UyLcPnD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exeUyLcPnD.exepid process 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 2176 UyLcPnD.exe 2176 UyLcPnD.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 2176 UyLcPnD.exe 2176 UyLcPnD.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
UyLcPnD.exeaebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exedescription pid process Token: SeBackupPrivilege 2176 UyLcPnD.exe Token: SeBackupPrivilege 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exenet.exenet.exenet.exeUyLcPnD.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 4448 wrote to memory of 2176 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe UyLcPnD.exe PID 4448 wrote to memory of 2176 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe UyLcPnD.exe PID 4448 wrote to memory of 2176 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe UyLcPnD.exe PID 4448 wrote to memory of 480 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 480 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 480 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 3484 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 3484 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 3484 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 480 wrote to memory of 5064 480 net.exe net1.exe PID 480 wrote to memory of 5064 480 net.exe net1.exe PID 480 wrote to memory of 5064 480 net.exe net1.exe PID 3484 wrote to memory of 3044 3484 net.exe net1.exe PID 3484 wrote to memory of 3044 3484 net.exe net1.exe PID 3484 wrote to memory of 3044 3484 net.exe net1.exe PID 4448 wrote to memory of 3448 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 3448 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 3448 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 3448 wrote to memory of 4740 3448 net.exe net1.exe PID 3448 wrote to memory of 4740 3448 net.exe net1.exe PID 3448 wrote to memory of 4740 3448 net.exe net1.exe PID 4448 wrote to memory of 3496 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 3496 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 3496 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 2176 wrote to memory of 3344 2176 UyLcPnD.exe net.exe PID 2176 wrote to memory of 3344 2176 UyLcPnD.exe net.exe PID 2176 wrote to memory of 3344 2176 UyLcPnD.exe net.exe PID 3496 wrote to memory of 864 3496 net.exe net1.exe PID 3496 wrote to memory of 864 3496 net.exe net1.exe PID 3496 wrote to memory of 864 3496 net.exe net1.exe PID 3344 wrote to memory of 2856 3344 net.exe net1.exe PID 3344 wrote to memory of 2856 3344 net.exe net1.exe PID 3344 wrote to memory of 2856 3344 net.exe net1.exe PID 2176 wrote to memory of 2392 2176 UyLcPnD.exe net.exe PID 2176 wrote to memory of 2392 2176 UyLcPnD.exe net.exe PID 2176 wrote to memory of 2392 2176 UyLcPnD.exe net.exe PID 2392 wrote to memory of 3852 2392 net.exe net1.exe PID 2392 wrote to memory of 3852 2392 net.exe net1.exe PID 2392 wrote to memory of 3852 2392 net.exe net1.exe PID 4448 wrote to memory of 10892 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 10892 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 10892 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 10896 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 10896 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 10896 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 10896 wrote to memory of 11060 10896 net.exe net1.exe PID 10896 wrote to memory of 11060 10896 net.exe net1.exe PID 10896 wrote to memory of 11060 10896 net.exe net1.exe PID 10892 wrote to memory of 11012 10892 net.exe net1.exe PID 10892 wrote to memory of 11012 10892 net.exe net1.exe PID 10892 wrote to memory of 11012 10892 net.exe net1.exe PID 4448 wrote to memory of 1480 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 1480 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 1480 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 5464 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 5464 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 4448 wrote to memory of 5464 4448 aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe net.exe PID 1480 wrote to memory of 4756 1480 net.exe net1.exe PID 1480 wrote to memory of 4756 1480 net.exe net1.exe PID 1480 wrote to memory of 4756 1480 net.exe net1.exe PID 5464 wrote to memory of 4752 5464 net.exe net1.exe PID 5464 wrote to memory of 4752 5464 net.exe net1.exe PID 5464 wrote to memory of 4752 5464 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe"C:\Users\Admin\AppData\Local\Temp\aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\UyLcPnD.exe"C:\Users\Admin\AppData\Local\Temp\UyLcPnD.exe" 8 LAN2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_e269d2c1-0edf-4391-ac7b-818b8e88b04fMD5
93a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
C:\Users\Admin\AppData\Local\Temp\UyLcPnD.exeMD5
856961d44f9e6775ad573cf58c438a2a
SHA1818bbf02fd1bd0eda9ee62c73b63266bf859e699
SHA256aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c
SHA512d6bfb664f6a1496df539c86a9b2b2b1bf3d43e252109af2f3e9dc40b566804e0b6d8ef051f953ea998391664ce8db8ea2dc5b2b4199493082e473c9b196ebc0e
-
C:\Users\Admin\AppData\Local\Temp\UyLcPnD.exeMD5
856961d44f9e6775ad573cf58c438a2a
SHA1818bbf02fd1bd0eda9ee62c73b63266bf859e699
SHA256aebfcf161ae2086459aa9ca99cbab2c2118a6d617fe645d65c148c5d3436de5c
SHA512d6bfb664f6a1496df539c86a9b2b2b1bf3d43e252109af2f3e9dc40b566804e0b6d8ef051f953ea998391664ce8db8ea2dc5b2b4199493082e473c9b196ebc0e