Analysis
-
max time kernel
174s -
max time network
33s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 04:16
Static task
static1
Behavioral task
behavioral1
Sample
97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe
Resource
win10v2004-en-20220112
General
-
Target
97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe
-
Size
384KB
-
MD5
002e3ea0f8a404171a0995a8cbce2588
-
SHA1
fbf489d4114a585fcb4af427f8c44cb661de0f74
-
SHA256
97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5
-
SHA512
dc8551f5c4ca02b156012852d578ffc73c2f66aab329cd5ab4c8857f666d00092b37d29bcc2c83555c97c56dea25d46b4546a91afba9e54e3446badcc8d3a9ea
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
Processes:
vZcBC.exepid process 1704 vZcBC.exe -
Deletes itself 1 IoCs
Processes:
vZcBC.exepid process 1704 vZcBC.exe -
Loads dropped DLL 1 IoCs
Processes:
97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exepid process 1628 97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\vZcBC.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
taskhost.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Metlakatla taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\chapters-static.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_matte.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationLeft_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jawt.h taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Tucuman taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\babypink.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\CircleSubpicture.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ko_KR.jar taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationUp_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\1047x576black.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\PreviousMenuButtonIcon.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Porto_Velho taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\blackbars80.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\local_policy.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Johannesburg taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIconSubpict.png taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Tiki.gif taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationRight_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationUp_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\CIEXYZ.pf taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Boise taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-next-static.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_LOOP_BG_PAL.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\sysinfo taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_CopyDrop32x32.gif taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Gaza taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ja-jp.xml taskhost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationLeft_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Passport.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkServerCP taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Amman taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrb.xml taskhost.exe File opened for modification C:\Program Files\Common Files\System\msadc\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\videowall.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\default.jfc taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Cambridge_Bay taskhost.exe File opened for modification C:\Program Files\DVD Maker\rtstreamsource.ax taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\1047x576black.png taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
vZcBC.exepid process 1704 vZcBC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vZcBC.exedescription pid process Token: SeDebugPrivilege 1704 vZcBC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exevZcBC.execmd.exedescription pid process target process PID 1628 wrote to memory of 1704 1628 97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe vZcBC.exe PID 1628 wrote to memory of 1704 1628 97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe vZcBC.exe PID 1628 wrote to memory of 1704 1628 97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe vZcBC.exe PID 1628 wrote to memory of 1704 1628 97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe vZcBC.exe PID 1704 wrote to memory of 740 1704 vZcBC.exe cmd.exe PID 1704 wrote to memory of 740 1704 vZcBC.exe cmd.exe PID 1704 wrote to memory of 740 1704 vZcBC.exe cmd.exe PID 1704 wrote to memory of 1124 1704 vZcBC.exe taskhost.exe PID 1704 wrote to memory of 1224 1704 vZcBC.exe Dwm.exe PID 1704 wrote to memory of 740 1704 vZcBC.exe cmd.exe PID 740 wrote to memory of 1868 740 cmd.exe reg.exe PID 740 wrote to memory of 1868 740 cmd.exe reg.exe PID 740 wrote to memory of 1868 740 cmd.exe reg.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops file in Program Files directory
PID:1124
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe"C:\Users\Admin\AppData\Local\Temp\97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\users\Public\vZcBC.exe"C:\users\Public\vZcBC.exe" C:\Users\Admin\AppData\Local\Temp\97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\vZcBC.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\vZcBC.exe" /f4⤵
- Adds Run key to start application
PID:1868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
31bd0f224e7e74eee2847f43aae23974
SHA192e331e1e8ad30538f38dd7ba31386afafa14a58
SHA2568b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d
SHA512a13f05a12b084ef425f542ff4be824bbccb5dbdfe085af8b7e19d81a6bcba4b8c1debcc38f6b57bc9265a4db21eed70852ece8cc62b3ef14c47fca3035a55249
-
MD5
31bd0f224e7e74eee2847f43aae23974
SHA192e331e1e8ad30538f38dd7ba31386afafa14a58
SHA2568b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d
SHA512a13f05a12b084ef425f542ff4be824bbccb5dbdfe085af8b7e19d81a6bcba4b8c1debcc38f6b57bc9265a4db21eed70852ece8cc62b3ef14c47fca3035a55249