Analysis
-
max time kernel
170s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 04:31
Static task
static1
Behavioral task
behavioral1
Sample
92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe
Resource
win10v2004-en-20220112
General
-
Target
92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe
-
Size
192KB
-
MD5
038fecb750d14f0a31fa83f3f95b7e88
-
SHA1
b5e793997283f6706d89f3f9f05389bd786c63b4
-
SHA256
92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d
-
SHA512
79263ae2f6489382995a9baab87aec46b91665221b6a837b642143587c095d8cf4a6f03c8f8a2883405ba16a750d987c374f88623d83fdd1d3d7467cf77c82ed
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
Processes:
yXivCIQ.exepid process 1456 yXivCIQ.exe -
Loads dropped DLL 2 IoCs
Processes:
92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exepid process 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exeyXivCIQ.exepid process 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 1456 yXivCIQ.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 1456 yXivCIQ.exe 1456 yXivCIQ.exe 1456 yXivCIQ.exe 1456 yXivCIQ.exe 1456 yXivCIQ.exe 1456 yXivCIQ.exe 1456 yXivCIQ.exe 1456 yXivCIQ.exe 1456 yXivCIQ.exe 1456 yXivCIQ.exe 1456 yXivCIQ.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe 1456 yXivCIQ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exeyXivCIQ.exedescription pid process Token: SeBackupPrivilege 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe Token: SeBackupPrivilege 1456 yXivCIQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exeyXivCIQ.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 960 wrote to memory of 1456 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe yXivCIQ.exe PID 960 wrote to memory of 1456 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe yXivCIQ.exe PID 960 wrote to memory of 1456 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe yXivCIQ.exe PID 960 wrote to memory of 1456 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe yXivCIQ.exe PID 960 wrote to memory of 340 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 340 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 340 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 340 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 1836 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 1836 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 1836 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 1836 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 1456 wrote to memory of 1576 1456 yXivCIQ.exe net.exe PID 1456 wrote to memory of 1576 1456 yXivCIQ.exe net.exe PID 1456 wrote to memory of 1576 1456 yXivCIQ.exe net.exe PID 1456 wrote to memory of 1576 1456 yXivCIQ.exe net.exe PID 960 wrote to memory of 2080 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 2080 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 2080 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 2080 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 2072 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 2072 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 2072 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 2072 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 1456 wrote to memory of 2160 1456 yXivCIQ.exe net.exe PID 1456 wrote to memory of 2160 1456 yXivCIQ.exe net.exe PID 1456 wrote to memory of 2160 1456 yXivCIQ.exe net.exe PID 1456 wrote to memory of 2160 1456 yXivCIQ.exe net.exe PID 1576 wrote to memory of 2748 1576 net.exe net1.exe PID 1576 wrote to memory of 2748 1576 net.exe net1.exe PID 1576 wrote to memory of 2748 1576 net.exe net1.exe PID 1576 wrote to memory of 2748 1576 net.exe net1.exe PID 2072 wrote to memory of 2772 2072 net.exe net1.exe PID 2072 wrote to memory of 2772 2072 net.exe net1.exe PID 2072 wrote to memory of 2772 2072 net.exe net1.exe PID 2072 wrote to memory of 2772 2072 net.exe net1.exe PID 1836 wrote to memory of 2740 1836 net.exe net1.exe PID 1836 wrote to memory of 2740 1836 net.exe net1.exe PID 1836 wrote to memory of 2740 1836 net.exe net1.exe PID 1836 wrote to memory of 2740 1836 net.exe net1.exe PID 2160 wrote to memory of 2756 2160 net.exe net1.exe PID 2160 wrote to memory of 2756 2160 net.exe net1.exe PID 2160 wrote to memory of 2756 2160 net.exe net1.exe PID 2160 wrote to memory of 2756 2160 net.exe net1.exe PID 2080 wrote to memory of 2764 2080 net.exe net1.exe PID 2080 wrote to memory of 2764 2080 net.exe net1.exe PID 2080 wrote to memory of 2764 2080 net.exe net1.exe PID 2080 wrote to memory of 2764 2080 net.exe net1.exe PID 340 wrote to memory of 2780 340 net.exe net1.exe PID 340 wrote to memory of 2780 340 net.exe net1.exe PID 340 wrote to memory of 2780 340 net.exe net1.exe PID 340 wrote to memory of 2780 340 net.exe net1.exe PID 960 wrote to memory of 31084 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 31084 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 31084 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 31084 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 31120 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 31120 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 31120 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 960 wrote to memory of 31120 960 92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe net.exe PID 31120 wrote to memory of 31236 31120 net.exe net1.exe PID 31120 wrote to memory of 31236 31120 net.exe net1.exe PID 31120 wrote to memory of 31236 31120 net.exe net1.exe PID 31120 wrote to memory of 31236 31120 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe"C:\Users\Admin\AppData\Local\Temp\92815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\yXivCIQ.exe"C:\Users\Admin\AppData\Local\Temp\yXivCIQ.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_3bd845b8-ce6a-4337-9974-31490196462aMD5
93a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.htmlMD5
c335018c1bedd8bd7fed708df1b14c77
SHA14b5d6315b7db23996cd975f09aa93b0d16a85b14
SHA25677efbe7c77e01a2d6de21c45c41bc84d9b67fcb9b35d01a52c58dd04e26efdc8
SHA5120d013247aa49790a1461a80023a31137cdc05439e49bd15e737f07208133d2ae09dfd86a95498495cf0fea5beba186e2f6d703866027bd54f38c92f2a607234f
-
C:\Users\Admin\AppData\Local\Temp\yXivCIQ.exeMD5
038fecb750d14f0a31fa83f3f95b7e88
SHA1b5e793997283f6706d89f3f9f05389bd786c63b4
SHA25692815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d
SHA51279263ae2f6489382995a9baab87aec46b91665221b6a837b642143587c095d8cf4a6f03c8f8a2883405ba16a750d987c374f88623d83fdd1d3d7467cf77c82ed
-
\Users\Admin\AppData\Local\Temp\yXivCIQ.exeMD5
038fecb750d14f0a31fa83f3f95b7e88
SHA1b5e793997283f6706d89f3f9f05389bd786c63b4
SHA25692815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d
SHA51279263ae2f6489382995a9baab87aec46b91665221b6a837b642143587c095d8cf4a6f03c8f8a2883405ba16a750d987c374f88623d83fdd1d3d7467cf77c82ed
-
\Users\Admin\AppData\Local\Temp\yXivCIQ.exeMD5
038fecb750d14f0a31fa83f3f95b7e88
SHA1b5e793997283f6706d89f3f9f05389bd786c63b4
SHA25692815ba6471287eb405fe74ee85ed000821d4d6f8c9a0154b289be8b2e7c7e5d
SHA51279263ae2f6489382995a9baab87aec46b91665221b6a837b642143587c095d8cf4a6f03c8f8a2883405ba16a750d987c374f88623d83fdd1d3d7467cf77c82ed
-
memory/960-55-0x0000000076921000-0x0000000076923000-memory.dmpFilesize
8KB
-
memory/1456-62-0x000000000E140000-0x000000000EBFA000-memory.dmpFilesize
10.7MB