Analysis
-
max time kernel
204s -
max time network
28s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe
Resource
win10v2004-en-20220113
General
-
Target
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe
-
Size
168KB
-
MD5
8ebc7a62a10f80deba528943af806064
-
SHA1
03ded58db9c70793fe4ef1837078ff2780358efb
-
SHA256
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f
-
SHA512
ff00db4bee7997a561ec8a2281299191f9012e361ad4f593c9706bf43d7f97466bcf1de3da2674fa42b3cd8091ad3a680c915392ae9f595363214c78ef1862a2
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 668 wrote to memory of 1944 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 29 PID 668 wrote to memory of 1944 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 29 PID 668 wrote to memory of 1944 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 29 PID 668 wrote to memory of 1944 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 29 PID 1944 wrote to memory of 2168 1944 net.exe 31 PID 1944 wrote to memory of 2168 1944 net.exe 31 PID 1944 wrote to memory of 2168 1944 net.exe 31 PID 1944 wrote to memory of 2168 1944 net.exe 31 PID 668 wrote to memory of 2628 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 32 PID 668 wrote to memory of 2628 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 32 PID 668 wrote to memory of 2628 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 32 PID 668 wrote to memory of 2628 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 32 PID 2628 wrote to memory of 2708 2628 net.exe 34 PID 2628 wrote to memory of 2708 2628 net.exe 34 PID 2628 wrote to memory of 2708 2628 net.exe 34 PID 2628 wrote to memory of 2708 2628 net.exe 34 PID 668 wrote to memory of 8572 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 35 PID 668 wrote to memory of 8572 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 35 PID 668 wrote to memory of 8572 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 35 PID 668 wrote to memory of 8572 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 35 PID 8572 wrote to memory of 8596 8572 net.exe 37 PID 8572 wrote to memory of 8596 8572 net.exe 37 PID 8572 wrote to memory of 8596 8572 net.exe 37 PID 8572 wrote to memory of 8596 8572 net.exe 37 PID 668 wrote to memory of 8632 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 38 PID 668 wrote to memory of 8632 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 38 PID 668 wrote to memory of 8632 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 38 PID 668 wrote to memory of 8632 668 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 38 PID 8632 wrote to memory of 8656 8632 net.exe 40 PID 8632 wrote to memory of 8656 8632 net.exe 40 PID 8632 wrote to memory of 8656 8632 net.exe 40 PID 8632 wrote to memory of 8656 8632 net.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe"C:\Users\Admin\AppData\Local\Temp\ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2168
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2708
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8596
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8656
-
-