Analysis
-
max time kernel
177s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 05:08
Static task
static1
Behavioral task
behavioral1
Sample
8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe
Resource
win10v2004-en-20220113
General
-
Target
8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe
-
Size
187KB
-
MD5
2ee9a7ce3356c032d49c1947761c63b2
-
SHA1
30181311c46b89cc3e01d3d8207c4c533199fa88
-
SHA256
8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2
-
SHA512
d2e8c140e5935ab0761283c8f85a0f9881129a0f131e51d1d4e1257d47874be9326437bac33c1f921eff3f0658b0147f026492083e47d8bea6b50ddc9873afd2
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 10412 created 1300 10412 WerFault.exe 86 PID 10420 created 1300 10420 WerFault.exe 86 -
Executes dropped EXE 1 IoCs
pid Process 1300 LIwIAuS.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation LIwIAuS.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 1300 LIwIAuS.exe 1300 LIwIAuS.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe Token: SeBackupPrivilege 1300 LIwIAuS.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1300 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 86 PID 4692 wrote to memory of 1300 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 86 PID 4692 wrote to memory of 1300 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 86 PID 4692 wrote to memory of 1244 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 87 PID 4692 wrote to memory of 1244 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 87 PID 4692 wrote to memory of 1244 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 87 PID 1244 wrote to memory of 4416 1244 net.exe 89 PID 1244 wrote to memory of 4416 1244 net.exe 89 PID 1244 wrote to memory of 4416 1244 net.exe 89 PID 4692 wrote to memory of 3528 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 90 PID 4692 wrote to memory of 3528 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 90 PID 4692 wrote to memory of 3528 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 90 PID 3528 wrote to memory of 632 3528 net.exe 92 PID 3528 wrote to memory of 632 3528 net.exe 92 PID 3528 wrote to memory of 632 3528 net.exe 92 PID 4692 wrote to memory of 2664 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 93 PID 4692 wrote to memory of 2664 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 93 PID 4692 wrote to memory of 2664 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 93 PID 2664 wrote to memory of 4644 2664 net.exe 95 PID 2664 wrote to memory of 4644 2664 net.exe 95 PID 2664 wrote to memory of 4644 2664 net.exe 95 PID 4692 wrote to memory of 1932 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 96 PID 4692 wrote to memory of 1932 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 96 PID 4692 wrote to memory of 1932 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 96 PID 1932 wrote to memory of 3596 1932 net.exe 98 PID 1932 wrote to memory of 3596 1932 net.exe 98 PID 1932 wrote to memory of 3596 1932 net.exe 98 PID 1300 wrote to memory of 1168 1300 LIwIAuS.exe 99 PID 1300 wrote to memory of 1168 1300 LIwIAuS.exe 99 PID 1300 wrote to memory of 1168 1300 LIwIAuS.exe 99 PID 1168 wrote to memory of 4756 1168 net.exe 101 PID 1168 wrote to memory of 4756 1168 net.exe 101 PID 1168 wrote to memory of 4756 1168 net.exe 101 PID 1300 wrote to memory of 5036 1300 LIwIAuS.exe 102 PID 1300 wrote to memory of 5036 1300 LIwIAuS.exe 102 PID 1300 wrote to memory of 5036 1300 LIwIAuS.exe 102 PID 4692 wrote to memory of 3312 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 103 PID 4692 wrote to memory of 3312 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 103 PID 4692 wrote to memory of 3312 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 103 PID 4692 wrote to memory of 504 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 104 PID 4692 wrote to memory of 504 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 104 PID 4692 wrote to memory of 504 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 104 PID 4692 wrote to memory of 10152 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 105 PID 4692 wrote to memory of 10152 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 105 PID 4692 wrote to memory of 10152 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 105 PID 4692 wrote to memory of 9792 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 106 PID 4692 wrote to memory of 9792 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 106 PID 4692 wrote to memory of 9792 4692 8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe 106 PID 5036 wrote to memory of 9988 5036 net.exe 113 PID 5036 wrote to memory of 9988 5036 net.exe 113 PID 5036 wrote to memory of 9988 5036 net.exe 113 PID 504 wrote to memory of 10020 504 net.exe 114 PID 504 wrote to memory of 10020 504 net.exe 114 PID 504 wrote to memory of 10020 504 net.exe 114 PID 10152 wrote to memory of 10024 10152 net.exe 117 PID 10152 wrote to memory of 10024 10152 net.exe 117 PID 10152 wrote to memory of 10024 10152 net.exe 117 PID 9792 wrote to memory of 3120 9792 net.exe 115 PID 9792 wrote to memory of 3120 9792 net.exe 115 PID 9792 wrote to memory of 3120 9792 net.exe 115 PID 3312 wrote to memory of 10036 3312 net.exe 116 PID 3312 wrote to memory of 10036 3312 net.exe 116 PID 3312 wrote to memory of 10036 3312 net.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe"C:\Users\Admin\AppData\Local\Temp\8366f63d37f8cefda19657c49000b662c4dde38463517c34168b33bf427db5d2.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\LIwIAuS.exe"C:\Users\Admin\AppData\Local\Temp\LIwIAuS.exe" 8 LAN2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵PID:4756
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:9988
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:4416
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:632
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:4644
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:3596
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:10036
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:10020
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:10152 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:10024
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:9792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:3120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1300 -ip 13001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1300 -ip 13001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10412