Analysis
-
max time kernel
171s -
max time network
158s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 05:29
Static task
static1
Behavioral task
behavioral1
Sample
7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe
Resource
win10v2004-en-20220113
General
-
Target
7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe
-
Size
200KB
-
MD5
f137ba372038184053d680941a2da136
-
SHA1
0ff2395df05c29dceeb23d6cce12798997b47b96
-
SHA256
7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4
-
SHA512
9669b187a8aa8f88954765c1fc1c9ad343bbbbda0455e0e15bd86697c23d7e2a649732498b9bd3fc8a0cdb455f57224c40374155b83031a386daec2ad88f5ab7
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 1100 bpRnFes.exe -
Loads dropped DLL 2 IoCs
pid Process 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 432 icacls.exe 2248 icacls.exe 2256 icacls.exe 776 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1172 vssadmin.exe 2328 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1100 bpRnFes.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1100 bpRnFes.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 1100 bpRnFes.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeBackupPrivilege 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe Token: SeBackupPrivilege 1896 vssvc.exe Token: SeRestorePrivilege 1896 vssvc.exe Token: SeAuditPrivilege 1896 vssvc.exe Token: SeBackupPrivilege 1100 bpRnFes.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1100 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 27 PID 1388 wrote to memory of 1100 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 27 PID 1388 wrote to memory of 1100 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 27 PID 1388 wrote to memory of 1100 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 27 PID 1388 wrote to memory of 772 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 28 PID 1388 wrote to memory of 772 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 28 PID 1388 wrote to memory of 772 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 28 PID 1388 wrote to memory of 772 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 28 PID 772 wrote to memory of 1372 772 net.exe 30 PID 772 wrote to memory of 1372 772 net.exe 30 PID 772 wrote to memory of 1372 772 net.exe 30 PID 772 wrote to memory of 1372 772 net.exe 30 PID 1388 wrote to memory of 1556 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 31 PID 1388 wrote to memory of 1556 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 31 PID 1388 wrote to memory of 1556 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 31 PID 1388 wrote to memory of 1556 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 31 PID 1556 wrote to memory of 876 1556 net.exe 33 PID 1556 wrote to memory of 876 1556 net.exe 33 PID 1556 wrote to memory of 876 1556 net.exe 33 PID 1556 wrote to memory of 876 1556 net.exe 33 PID 1388 wrote to memory of 776 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 34 PID 1388 wrote to memory of 776 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 34 PID 1388 wrote to memory of 776 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 34 PID 1388 wrote to memory of 776 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 34 PID 1388 wrote to memory of 432 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 36 PID 1388 wrote to memory of 432 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 36 PID 1388 wrote to memory of 432 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 36 PID 1388 wrote to memory of 432 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 36 PID 1388 wrote to memory of 1316 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 38 PID 1388 wrote to memory of 1316 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 38 PID 1388 wrote to memory of 1316 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 38 PID 1388 wrote to memory of 1316 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 38 PID 1316 wrote to memory of 1172 1316 cmd.exe 40 PID 1316 wrote to memory of 1172 1316 cmd.exe 40 PID 1316 wrote to memory of 1172 1316 cmd.exe 40 PID 1316 wrote to memory of 1172 1316 cmd.exe 40 PID 1388 wrote to memory of 2004 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 42 PID 1388 wrote to memory of 2004 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 42 PID 1388 wrote to memory of 2004 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 42 PID 1388 wrote to memory of 2004 1388 7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe 42 PID 2004 wrote to memory of 1628 2004 net.exe 44 PID 2004 wrote to memory of 1628 2004 net.exe 44 PID 2004 wrote to memory of 1628 2004 net.exe 44 PID 2004 wrote to memory of 1628 2004 net.exe 44 PID 1100 wrote to memory of 2248 1100 bpRnFes.exe 45 PID 1100 wrote to memory of 2248 1100 bpRnFes.exe 45 PID 1100 wrote to memory of 2248 1100 bpRnFes.exe 45 PID 1100 wrote to memory of 2248 1100 bpRnFes.exe 45 PID 1100 wrote to memory of 2256 1100 bpRnFes.exe 47 PID 1100 wrote to memory of 2256 1100 bpRnFes.exe 47 PID 1100 wrote to memory of 2256 1100 bpRnFes.exe 47 PID 1100 wrote to memory of 2256 1100 bpRnFes.exe 47 PID 1100 wrote to memory of 2272 1100 bpRnFes.exe 49 PID 1100 wrote to memory of 2272 1100 bpRnFes.exe 49 PID 1100 wrote to memory of 2272 1100 bpRnFes.exe 49 PID 1100 wrote to memory of 2272 1100 bpRnFes.exe 49 PID 2272 wrote to memory of 2328 2272 cmd.exe 51 PID 2272 wrote to memory of 2328 2272 cmd.exe 51 PID 2272 wrote to memory of 2328 2272 cmd.exe 51 PID 2272 wrote to memory of 2328 2272 cmd.exe 51 PID 1100 wrote to memory of 2412 1100 bpRnFes.exe 53 PID 1100 wrote to memory of 2412 1100 bpRnFes.exe 53 PID 1100 wrote to memory of 2412 1100 bpRnFes.exe 53 PID 1100 wrote to memory of 2412 1100 bpRnFes.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe"C:\Users\Admin\AppData\Local\Temp\7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\bpRnFes.exe"C:\Users\Admin\AppData\Local\Temp\bpRnFes.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
PID:2248
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
PID:2256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vssadmin.exe Delete Shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2328
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:2412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:2468
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:21464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:21488
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:31268
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:31320
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1372
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:876
-
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:776
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vssadmin.exe Delete Shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1172
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1628
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:15332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:15268
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:19092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:19152
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:17384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:21448
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:1740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:27244
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1896