Analysis
-
max time kernel
171s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 05:06
Static task
static1
Behavioral task
behavioral1
Sample
8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe
Resource
win10v2004-en-20220113
General
-
Target
8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe
-
Size
131KB
-
MD5
c9db89ba61448837bd75b73f5be395c1
-
SHA1
2175b61a4dbe404498228ec7b9e53890bf0e0b6b
-
SHA256
8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4
-
SHA512
9d7e2259f5eb085e3929a69c4f3907b74c597e26462c7a7becf3ce191890e8f43b30d495a1f66d5028e3a13d07ce2dde0ada8d28cf52ee32026f2efe5e2d3cf4
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14aJo5L9PTZhv8XX6qRPncbTXecb8Qohqb
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\desktop.ini 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\id.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\AddUse.vsd 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipschs.xml 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed.xrm-ms 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground.wmv 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Scene_loop.wmv 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\203x8subpicture.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad.xml 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\System\ado\msado26.tlb 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047x576black.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptb.xml 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Notes_loop.wmv 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\pushplaysubpicture.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\720x480icongraphic.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_scrapbook_Thumbnail.bmp 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMainMask_PAL.wmv 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\menu_style_default_Thumbnail.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\1047x576_91n92.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_SelectionSubpicture.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\To_Do_List.emf 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\7-Zip\History.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_2.emf 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-background.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circle_glass_Thumbnail.bmp 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\blackbars60.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_ButtonGraphic.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationLeft_SelectionSubpicture.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMain.wmv 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Title_mainImage-mask.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationUp_SelectionSubpicture.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-over-DOT.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-shadow.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrcatlm.dat 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\bear_formatted_rgb6.wmv 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-back-static.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\TitleButtonSubpicture.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push.png 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\System\ado\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\sqlxmlx.rll.mui 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\RyukReadMe.txt 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1136 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1136 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1136 wrote to memory of 792 1136 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe 27 PID 1136 wrote to memory of 792 1136 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe 27 PID 1136 wrote to memory of 792 1136 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe 27 PID 1136 wrote to memory of 792 1136 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe 27 PID 1136 wrote to memory of 1208 1136 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe 15 PID 1136 wrote to memory of 1300 1136 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe 14 PID 1136 wrote to memory of 792 1136 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe 27 PID 1136 wrote to memory of 320 1136 8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe 28 PID 792 wrote to memory of 1632 792 cmd.exe 29 PID 792 wrote to memory of 1632 792 cmd.exe 29 PID 792 wrote to memory of 1632 792 cmd.exe 29 PID 792 wrote to memory of 1632 792 cmd.exe 29
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1300
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe"C:\Users\Admin\AppData\Local\Temp\8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe" /f /reg:642⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe" /f /reg:643⤵
- Adds Run key to start application
PID:1632
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "454446870-2078751958176106590-8134576631384567631-18451716916430804871910280670"1⤵PID:320