Analysis
-
max time kernel
201s -
max time network
98s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 05:11
Static task
static1
Behavioral task
behavioral1
Sample
81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe
Resource
win10v2004-en-20220113
General
-
Target
81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe
-
Size
192KB
-
MD5
567cf2eec7a754e6ac98f0f738418caa
-
SHA1
70a1b782865156a338894e9466f951143927703f
-
SHA256
81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013
-
SHA512
867b233c1a83ec8c46479b30e3dc37f5c306d33ec2804622e43be7cc9f45afa4a2873e4eff72f36353db68a3c12281dd11f2030b36b421fef145aa71136a0b88
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
Processes:
ynDiTTz.exepid process 1120 ynDiTTz.exe -
Loads dropped DLL 6 IoCs
Processes:
81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exeWerFault.exepid process 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 15488 1120 WerFault.exe ynDiTTz.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exeynDiTTz.exeWerFault.exepid process 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 1120 ynDiTTz.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 1120 ynDiTTz.exe 1120 ynDiTTz.exe 1120 ynDiTTz.exe 1120 ynDiTTz.exe 1120 ynDiTTz.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 1120 ynDiTTz.exe 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe 15488 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ynDiTTz.exe81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exeWerFault.exedescription pid process Token: SeBackupPrivilege 1120 ynDiTTz.exe Token: SeBackupPrivilege 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe Token: SeDebugPrivilege 15488 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exenet.exenet.exeynDiTTz.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 672 wrote to memory of 1120 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe ynDiTTz.exe PID 672 wrote to memory of 1120 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe ynDiTTz.exe PID 672 wrote to memory of 1120 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe ynDiTTz.exe PID 672 wrote to memory of 1120 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe ynDiTTz.exe PID 672 wrote to memory of 1072 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 1072 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 1072 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 1072 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 1072 wrote to memory of 1864 1072 net.exe net1.exe PID 1072 wrote to memory of 1864 1072 net.exe net1.exe PID 1072 wrote to memory of 1864 1072 net.exe net1.exe PID 1072 wrote to memory of 1864 1072 net.exe net1.exe PID 672 wrote to memory of 1056 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 1056 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 1056 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 1056 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 1056 wrote to memory of 1552 1056 net.exe net1.exe PID 1056 wrote to memory of 1552 1056 net.exe net1.exe PID 1056 wrote to memory of 1552 1056 net.exe net1.exe PID 1056 wrote to memory of 1552 1056 net.exe net1.exe PID 1120 wrote to memory of 1512 1120 ynDiTTz.exe net.exe PID 1120 wrote to memory of 1512 1120 ynDiTTz.exe net.exe PID 1120 wrote to memory of 1512 1120 ynDiTTz.exe net.exe PID 1120 wrote to memory of 1512 1120 ynDiTTz.exe net.exe PID 1512 wrote to memory of 1164 1512 net.exe net1.exe PID 1512 wrote to memory of 1164 1512 net.exe net1.exe PID 1512 wrote to memory of 1164 1512 net.exe net1.exe PID 1512 wrote to memory of 1164 1512 net.exe net1.exe PID 1120 wrote to memory of 1860 1120 ynDiTTz.exe net.exe PID 1120 wrote to memory of 1860 1120 ynDiTTz.exe net.exe PID 1120 wrote to memory of 1860 1120 ynDiTTz.exe net.exe PID 1120 wrote to memory of 1860 1120 ynDiTTz.exe net.exe PID 672 wrote to memory of 1920 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 1920 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 1920 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 1920 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 1920 wrote to memory of 1532 1920 net.exe net1.exe PID 1920 wrote to memory of 1532 1920 net.exe net1.exe PID 1920 wrote to memory of 1532 1920 net.exe net1.exe PID 1920 wrote to memory of 1532 1920 net.exe net1.exe PID 1860 wrote to memory of 1276 1860 net.exe net1.exe PID 1860 wrote to memory of 1276 1860 net.exe net1.exe PID 1860 wrote to memory of 1276 1860 net.exe net1.exe PID 1860 wrote to memory of 1276 1860 net.exe net1.exe PID 672 wrote to memory of 8544 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 8544 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 8544 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 8544 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 8544 wrote to memory of 8568 8544 net.exe net1.exe PID 8544 wrote to memory of 8568 8544 net.exe net1.exe PID 8544 wrote to memory of 8568 8544 net.exe net1.exe PID 8544 wrote to memory of 8568 8544 net.exe net1.exe PID 1120 wrote to memory of 12324 1120 ynDiTTz.exe net.exe PID 1120 wrote to memory of 12324 1120 ynDiTTz.exe net.exe PID 1120 wrote to memory of 12324 1120 ynDiTTz.exe net.exe PID 1120 wrote to memory of 12324 1120 ynDiTTz.exe net.exe PID 672 wrote to memory of 13436 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 13436 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 13436 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 672 wrote to memory of 13436 672 81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe net.exe PID 12324 wrote to memory of 13912 12324 net.exe net1.exe PID 12324 wrote to memory of 13912 12324 net.exe net1.exe PID 12324 wrote to memory of 13912 12324 net.exe net1.exe PID 12324 wrote to memory of 13912 12324 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe"C:\Users\Admin\AppData\Local\Temp\81c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ynDiTTz.exe"C:\Users\Admin\AppData\Local\Temp\ynDiTTz.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 128283⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_bc8e1036-7fb3-448e-8ad9-a824b1a03b8eMD5
93a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.htmlMD5
be46918f25b1aa58c459770d493a5b68
SHA1daf0a7ac0dc43646b8da0bdc775e78287820fed5
SHA256c34a56230ecb6d340795fed9f38c34e43b1faed0770bfa852ae5b1129883dec9
SHA51289ae71f3058537ee1c67d4a2b1820584fe5c4698df81e6c4f9e62c638cb96e95c9c2424d1bf62b7f42cac5ebb5af507ca70aca66676ae4765864191914473342
-
C:\Users\Admin\AppData\Local\Temp\ynDiTTz.exeMD5
567cf2eec7a754e6ac98f0f738418caa
SHA170a1b782865156a338894e9466f951143927703f
SHA25681c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013
SHA512867b233c1a83ec8c46479b30e3dc37f5c306d33ec2804622e43be7cc9f45afa4a2873e4eff72f36353db68a3c12281dd11f2030b36b421fef145aa71136a0b88
-
C:\Users\Admin\AppData\Local\Temp\ynDiTTz.exeMD5
567cf2eec7a754e6ac98f0f738418caa
SHA170a1b782865156a338894e9466f951143927703f
SHA25681c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013
SHA512867b233c1a83ec8c46479b30e3dc37f5c306d33ec2804622e43be7cc9f45afa4a2873e4eff72f36353db68a3c12281dd11f2030b36b421fef145aa71136a0b88
-
\Users\Admin\AppData\Local\Temp\ynDiTTz.exeMD5
567cf2eec7a754e6ac98f0f738418caa
SHA170a1b782865156a338894e9466f951143927703f
SHA25681c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013
SHA512867b233c1a83ec8c46479b30e3dc37f5c306d33ec2804622e43be7cc9f45afa4a2873e4eff72f36353db68a3c12281dd11f2030b36b421fef145aa71136a0b88
-
\Users\Admin\AppData\Local\Temp\ynDiTTz.exeMD5
567cf2eec7a754e6ac98f0f738418caa
SHA170a1b782865156a338894e9466f951143927703f
SHA25681c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013
SHA512867b233c1a83ec8c46479b30e3dc37f5c306d33ec2804622e43be7cc9f45afa4a2873e4eff72f36353db68a3c12281dd11f2030b36b421fef145aa71136a0b88
-
\Users\Admin\AppData\Local\Temp\ynDiTTz.exeMD5
567cf2eec7a754e6ac98f0f738418caa
SHA170a1b782865156a338894e9466f951143927703f
SHA25681c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013
SHA512867b233c1a83ec8c46479b30e3dc37f5c306d33ec2804622e43be7cc9f45afa4a2873e4eff72f36353db68a3c12281dd11f2030b36b421fef145aa71136a0b88
-
\Users\Admin\AppData\Local\Temp\ynDiTTz.exeMD5
567cf2eec7a754e6ac98f0f738418caa
SHA170a1b782865156a338894e9466f951143927703f
SHA25681c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013
SHA512867b233c1a83ec8c46479b30e3dc37f5c306d33ec2804622e43be7cc9f45afa4a2873e4eff72f36353db68a3c12281dd11f2030b36b421fef145aa71136a0b88
-
\Users\Admin\AppData\Local\Temp\ynDiTTz.exeMD5
567cf2eec7a754e6ac98f0f738418caa
SHA170a1b782865156a338894e9466f951143927703f
SHA25681c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013
SHA512867b233c1a83ec8c46479b30e3dc37f5c306d33ec2804622e43be7cc9f45afa4a2873e4eff72f36353db68a3c12281dd11f2030b36b421fef145aa71136a0b88
-
\Users\Admin\AppData\Local\Temp\ynDiTTz.exeMD5
567cf2eec7a754e6ac98f0f738418caa
SHA170a1b782865156a338894e9466f951143927703f
SHA25681c4866813a273f4c5e859f241ec28c973c974651a948553c6439bcd0a571013
SHA512867b233c1a83ec8c46479b30e3dc37f5c306d33ec2804622e43be7cc9f45afa4a2873e4eff72f36353db68a3c12281dd11f2030b36b421fef145aa71136a0b88
-
memory/672-54-0x0000000074F01000-0x0000000074F03000-memory.dmpFilesize
8KB
-
memory/1120-62-0x00000000026C0000-0x00000000026D4000-memory.dmpFilesize
80KB
-
memory/1120-65-0x0000000002720000-0x000000000272B000-memory.dmpFilesize
44KB
-
memory/1120-61-0x0000000002690000-0x00000000026B9000-memory.dmpFilesize
164KB
-
memory/15488-71-0x00000000006F0000-0x00000000006F1000-memory.dmpFilesize
4KB