Analysis
-
max time kernel
188s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 05:08
Static task
static1
Behavioral task
behavioral1
Sample
8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe
Resource
win10v2004-en-20220113
General
-
Target
8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe
-
Size
187KB
-
MD5
2ee9a7ce3356c032d49c1947761c63b2
-
SHA1
30181311c46b89cc3e01d3d8207c4c533199fa88
-
SHA256
8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2
-
SHA512
d2e8c140e5935ab0761283c8f85a0f9881129a0f131e51d1d4e1257d47874be9326437bac33c1f921eff3f0658b0147f026492083e47d8bea6b50ddc9873afd2
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 760 KgJNfBI.exe -
Loads dropped DLL 2 IoCs
pid Process 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 760 KgJNfBI.exe 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 760 KgJNfBI.exe 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe Token: SeBackupPrivilege 760 KgJNfBI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 760 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 27 PID 1916 wrote to memory of 760 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 27 PID 1916 wrote to memory of 760 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 27 PID 1916 wrote to memory of 760 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 27 PID 1916 wrote to memory of 240 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 28 PID 1916 wrote to memory of 240 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 28 PID 1916 wrote to memory of 240 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 28 PID 1916 wrote to memory of 240 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 28 PID 240 wrote to memory of 1092 240 net.exe 30 PID 240 wrote to memory of 1092 240 net.exe 30 PID 240 wrote to memory of 1092 240 net.exe 30 PID 240 wrote to memory of 1092 240 net.exe 30 PID 1916 wrote to memory of 1860 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 31 PID 1916 wrote to memory of 1860 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 31 PID 1916 wrote to memory of 1860 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 31 PID 1916 wrote to memory of 1860 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 31 PID 1860 wrote to memory of 364 1860 net.exe 33 PID 1860 wrote to memory of 364 1860 net.exe 33 PID 1860 wrote to memory of 364 1860 net.exe 33 PID 1860 wrote to memory of 364 1860 net.exe 33 PID 1916 wrote to memory of 1116 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 34 PID 1916 wrote to memory of 1116 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 34 PID 1916 wrote to memory of 1116 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 34 PID 1916 wrote to memory of 1116 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 34 PID 1116 wrote to memory of 1608 1116 net.exe 36 PID 1116 wrote to memory of 1608 1116 net.exe 36 PID 1116 wrote to memory of 1608 1116 net.exe 36 PID 1116 wrote to memory of 1608 1116 net.exe 36 PID 1916 wrote to memory of 896 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 37 PID 1916 wrote to memory of 896 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 37 PID 1916 wrote to memory of 896 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 37 PID 1916 wrote to memory of 896 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 37 PID 896 wrote to memory of 2188 896 net.exe 39 PID 896 wrote to memory of 2188 896 net.exe 39 PID 896 wrote to memory of 2188 896 net.exe 39 PID 896 wrote to memory of 2188 896 net.exe 39 PID 760 wrote to memory of 5532 760 KgJNfBI.exe 40 PID 760 wrote to memory of 5532 760 KgJNfBI.exe 40 PID 760 wrote to memory of 5532 760 KgJNfBI.exe 40 PID 760 wrote to memory of 5532 760 KgJNfBI.exe 40 PID 5532 wrote to memory of 5556 5532 net.exe 42 PID 5532 wrote to memory of 5556 5532 net.exe 42 PID 5532 wrote to memory of 5556 5532 net.exe 42 PID 5532 wrote to memory of 5556 5532 net.exe 42 PID 1916 wrote to memory of 16864 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 46 PID 1916 wrote to memory of 16864 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 46 PID 1916 wrote to memory of 16864 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 46 PID 1916 wrote to memory of 16864 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 46 PID 16864 wrote to memory of 16888 16864 net.exe 48 PID 16864 wrote to memory of 16888 16864 net.exe 48 PID 16864 wrote to memory of 16888 16864 net.exe 48 PID 16864 wrote to memory of 16888 16864 net.exe 48 PID 1916 wrote to memory of 16904 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 49 PID 1916 wrote to memory of 16904 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 49 PID 1916 wrote to memory of 16904 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 49 PID 1916 wrote to memory of 16904 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 49 PID 16904 wrote to memory of 16928 16904 net.exe 51 PID 16904 wrote to memory of 16928 16904 net.exe 51 PID 16904 wrote to memory of 16928 16904 net.exe 51 PID 16904 wrote to memory of 16928 16904 net.exe 51 PID 1916 wrote to memory of 16996 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 52 PID 1916 wrote to memory of 16996 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 52 PID 1916 wrote to memory of 16996 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 52 PID 1916 wrote to memory of 16996 1916 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe"C:\Users\Admin\AppData\Local\Temp\8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\KgJNfBI.exe"C:\Users\Admin\AppData\Local\Temp\KgJNfBI.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:5532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:5556
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:17080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:17104
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1092
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:364
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1608
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2188
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:16864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:16888
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:16904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:16928
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:16996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:17020
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:17036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:17064
-
-