Analysis

  • max time kernel
    171s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    20-02-2022 05:06

General

  • Target

    8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe

  • Size

    131KB

  • MD5

    c9db89ba61448837bd75b73f5be395c1

  • SHA1

    2175b61a4dbe404498228ec7b9e53890bf0e0b6b

  • SHA256

    8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4

  • SHA512

    9d7e2259f5eb085e3929a69c4f3907b74c597e26462c7a7becf3ce191890e8f43b30d495a1f66d5028e3a13d07ce2dde0ada8d28cf52ee32026f2efe5e2d3cf4

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorithm. Backups were either encrypted Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. We exclusively have decryption software for your situation. More than a year ago, world experts recognized the impossibility of deciphering by any means except the original decoder. No decryption software is available in the public. Antiviruse companies, researchers, IT specialists, and no other persons cant help you encrypt the data. DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT DELETE readme files. To confirm our honest intentions.Send 2 different random files and you will get it decrypted. It can be from different computers on your network to be sure that one key decrypts everything. 2 files we unlock for free To get info (decrypt your files) contact us at [email protected] or [email protected] BTC wallet: 14aJo5L9PTZhv8XX6qRPncbTXecb8Qohqb Ryuk No system is safe
Wallets

14aJo5L9PTZhv8XX6qRPncbTXecb8Qohqb

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1300
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
        PID:1208
      • C:\Users\Admin\AppData\Local\Temp\8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe
        "C:\Users\Admin\AppData\Local\Temp\8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe"
        1⤵
        • Drops desktop.ini file(s)
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1136
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe" /f /reg:64
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:792
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\8442a6a136ea46c9c5815736b4ba8a12e7976a21d75c229198d42b1c7213bfe4.exe" /f /reg:64
            3⤵
            • Adds Run key to start application
            PID:1632
      • C:\Windows\system32\conhost.exe
        \??\C:\Windows\system32\conhost.exe "454446870-2078751958176106590-8134576631384567631-18451716916430804871910280670"
        1⤵
          PID:320

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/792-60-0x0000000030000000-0x0000000030384000-memory.dmp
          Filesize

          3.5MB

        • memory/1136-55-0x0000000076511000-0x0000000076513000-memory.dmp
          Filesize

          8KB

        • memory/1208-56-0x0000000030000000-0x0000000030384000-memory.dmp
          Filesize

          3.5MB