Analysis
-
max time kernel
200s -
max time network
225s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe
Resource
win10v2004-en-20220113
General
-
Target
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe
-
Size
168KB
-
MD5
8ebc7a62a10f80deba528943af806064
-
SHA1
03ded58db9c70793fe4ef1837078ff2780358efb
-
SHA256
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f
-
SHA512
ff00db4bee7997a561ec8a2281299191f9012e361ad4f593c9706bf43d7f97466bcf1de3da2674fa42b3cd8091ad3a680c915392ae9f595363214c78ef1862a2
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exepid process 2760 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe 2760 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exedescription pid process Token: SeBackupPrivilege 2760 ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe"C:\Users\Admin\AppData\Local\Temp\ab5b8853961dbd4013c2fb44403eba2ac32abfbf4f65e2d32d83c5c642591e5f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760