Analysis
-
max time kernel
200s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
20-02-2022 04:16
Static task
static1
Behavioral task
behavioral1
Sample
97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe
Resource
win10v2004-en-20220112
General
-
Target
97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe
-
Size
384KB
-
MD5
002e3ea0f8a404171a0995a8cbce2588
-
SHA1
fbf489d4114a585fcb4af427f8c44cb661de0f74
-
SHA256
97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5
-
SHA512
dc8551f5c4ca02b156012852d578ffc73c2f66aab329cd5ab4c8857f666d00092b37d29bcc2c83555c97c56dea25d46b4546a91afba9e54e3446badcc8d3a9ea
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 3716 created 2652 3716 WerFault.exe 37 PID 2908 created 2828 2908 WerFault.exe 35 -
Executes dropped EXE 1 IoCs
pid Process 3684 uDqLV.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation uDqLV.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\uDqLV.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\de-DE\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setNetworkClientCP sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\flavormap.properties sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaTypewriterRegular.ttf sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_es.properties sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\US_export_policy.jar sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\ea.xml sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbynet.jar sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jvmticmlr.h sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jni.h sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipssve.xml sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\management\jmxremote.access sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\bundles.info sihost.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_es.jar sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.properties sihost.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\psfont.properties.ja sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\SubsystemController.man sihost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqlxmlx.rll.mui sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\resources.jar sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.properties sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man sihost.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\cldrdata.jar sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\vstoee90.tlb sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbytools.jar sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\management\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\LICENSE sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\NetworkServerControl.bat sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\access-bridge-64.jar sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\meta-index sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\dropins\README.TXT sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\feature.xml sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ko_KR.jar sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml sihost.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\ij sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\cursors.properties sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jawt.lib sihost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\RyukReadMe.txt sihost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1008 2652 WerFault.exe 37 3112 2652 WerFault.exe 37 2464 2828 WerFault.exe 35 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3684 uDqLV.exe 3684 uDqLV.exe 2464 WerFault.exe 2464 WerFault.exe 1008 WerFault.exe 1008 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3684 uDqLV.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3000 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3684 2232 97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe 68 PID 2232 wrote to memory of 3684 2232 97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe 68 PID 3684 wrote to memory of 1020 3684 uDqLV.exe 70 PID 3684 wrote to memory of 1020 3684 uDqLV.exe 70 PID 3684 wrote to memory of 2140 3684 uDqLV.exe 42 PID 3684 wrote to memory of 2160 3684 uDqLV.exe 41 PID 3684 wrote to memory of 2208 3684 uDqLV.exe 40 PID 3684 wrote to memory of 2456 3684 uDqLV.exe 38 PID 3684 wrote to memory of 2652 3684 uDqLV.exe 37 PID 1020 wrote to memory of 2608 1020 cmd.exe 72 PID 1020 wrote to memory of 2608 1020 cmd.exe 72 PID 3684 wrote to memory of 2828 3684 uDqLV.exe 35 PID 3684 wrote to memory of 3000 3684 uDqLV.exe 34 PID 3684 wrote to memory of 2204 3684 uDqLV.exe 33 PID 3684 wrote to memory of 3208 3684 uDqLV.exe 32 PID 3684 wrote to memory of 3616 3684 uDqLV.exe 30 PID 3684 wrote to memory of 3676 3684 uDqLV.exe 27 PID 2652 wrote to memory of 1008 2652 DllHost.exe 74 PID 2652 wrote to memory of 1008 2652 DllHost.exe 74 PID 2908 wrote to memory of 2828 2908 WerFault.exe 35 PID 2908 wrote to memory of 2828 2908 WerFault.exe 35 PID 3716 wrote to memory of 2652 3716 WerFault.exe 37 PID 3716 wrote to memory of 2652 3716 WerFault.exe 37
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3676
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3616
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3208
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2204
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:3000
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2828
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2828 -s 32202⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2652 -s 3882⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2652 -s 3882⤵
- Program crash
PID:3112
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p1⤵PID:2456
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup1⤵PID:2160
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Drops file in Program Files directory
PID:2140
-
C:\Users\Admin\AppData\Local\Temp\97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe"C:\Users\Admin\AppData\Local\Temp\97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\users\Public\uDqLV.exe"C:\users\Public\uDqLV.exe" C:\Users\Admin\AppData\Local\Temp\97f96adce3c5f14cc0c061abe98555bc9ac042100af5db0226aa9e10f34430a5.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\uDqLV.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\uDqLV.exe" /f4⤵
- Adds Run key to start application
PID:2608
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:2052
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 416 -p 2652 -ip 26521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3716
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 2828 -ip 28281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2908