Analysis
-
max time kernel
172s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 05:26
Static task
static1
Behavioral task
behavioral1
Sample
7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe
Resource
win10v2004-en-20220113
General
-
Target
7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe
-
Size
71KB
-
MD5
a2ea3c46d0a15c29fcd2000b1da24657
-
SHA1
8682038788db406bc5328757541b9da69d9304ad
-
SHA256
7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b
-
SHA512
1f7d73101aed9d3c5b2e739944e4469957cb4a105f76e90ed4d77662e78e596af24562faf30e33ec7914563044268e86053ff215c03b787c0870a3ade1bf3b5e
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\de.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\System\ado\msado25.tlb 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_ja.properties 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\InvokeRequest.eprtx 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaSansRegular.ttf 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_ca.xml 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_zh_CN.jar 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\psfont.properties.ja 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\feature.properties 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\.eclipseproduct 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\th-TH\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\System\ado\msado28.tlb 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcjavas.inc 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_heb.xml 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\stopNetworkServer 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\javaws.policy 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jawt.lib 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.xml 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\MANIFEST.MF 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.properties 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\README.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\feature.xml 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\applet\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy.jar 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr\default.jfc 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\NetworkServerControl.bat 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages.properties 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaBrightDemiBold.ttf 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\license.html 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsrom.xml 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\NetworkServerControl 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\eclipse_update_120.jpg 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred.xml 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\RyukReadMe.txt 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3332 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 86 PID 2184 wrote to memory of 3332 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 86 PID 2184 wrote to memory of 3332 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 86 PID 2184 wrote to memory of 2344 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 63 PID 3332 wrote to memory of 3700 3332 cmd.exe 88 PID 3332 wrote to memory of 3700 3332 cmd.exe 88 PID 3332 wrote to memory of 3700 3332 cmd.exe 88 PID 2184 wrote to memory of 2372 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 62 PID 2184 wrote to memory of 2468 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 61 PID 2184 wrote to memory of 1148 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 34 PID 2184 wrote to memory of 3248 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 33 PID 2184 wrote to memory of 3340 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 31 PID 2184 wrote to memory of 3412 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 29 PID 2184 wrote to memory of 3492 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 30 PID 2184 wrote to memory of 3692 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 32 PID 2184 wrote to memory of 3088 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 51 PID 2184 wrote to memory of 932 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 37 PID 2184 wrote to memory of 1588 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 40 PID 2184 wrote to memory of 3084 2184 7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe 45
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3412
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3492
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3340
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3692
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:1148
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:932
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1588
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3084
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3088
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2372
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe"C:\Users\Admin\AppData\Local\Temp\7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe" /f /reg:642⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7b91993341995065df2a78819d0984fa7760c4bac8d50ad62d3150eeed2c3f8b.exe" /f /reg:643⤵
- Adds Run key to start application
PID:3700
-
-