Analysis
-
max time kernel
204s -
max time network
28s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe
Resource
win10v2004-en-20220113
General
-
Target
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe
-
Size
168KB
-
MD5
8ebc7a62a10f80deba528943af806064
-
SHA1
03ded58db9c70793fe4ef1837078ff2780358efb
-
SHA256
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f
-
SHA512
ff00db4bee7997a561ec8a2281299191f9012e361ad4f593c9706bf43d7f97466bcf1de3da2674fa42b3cd8091ad3a680c915392ae9f595363214c78ef1862a2
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exepid process 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exedescription pid process Token: SeBackupPrivilege 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exenet.exenet.exenet.exenet.exedescription pid process target process PID 668 wrote to memory of 1944 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 1944 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 1944 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 1944 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 1944 wrote to memory of 2168 1944 net.exe net1.exe PID 1944 wrote to memory of 2168 1944 net.exe net1.exe PID 1944 wrote to memory of 2168 1944 net.exe net1.exe PID 1944 wrote to memory of 2168 1944 net.exe net1.exe PID 668 wrote to memory of 2628 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 2628 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 2628 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 2628 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 2628 wrote to memory of 2708 2628 net.exe net1.exe PID 2628 wrote to memory of 2708 2628 net.exe net1.exe PID 2628 wrote to memory of 2708 2628 net.exe net1.exe PID 2628 wrote to memory of 2708 2628 net.exe net1.exe PID 668 wrote to memory of 8572 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 8572 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 8572 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 8572 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 8572 wrote to memory of 8596 8572 net.exe net1.exe PID 8572 wrote to memory of 8596 8572 net.exe net1.exe PID 8572 wrote to memory of 8596 8572 net.exe net1.exe PID 8572 wrote to memory of 8596 8572 net.exe net1.exe PID 668 wrote to memory of 8632 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 8632 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 8632 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 668 wrote to memory of 8632 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe net.exe PID 8632 wrote to memory of 8656 8632 net.exe net1.exe PID 8632 wrote to memory of 8656 8632 net.exe net1.exe PID 8632 wrote to memory of 8656 8632 net.exe net1.exe PID 8632 wrote to memory of 8656 8632 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe"C:\Users\Admin\AppData\Local\Temp\ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2168
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2708
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8596
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8656