Analysis

  • max time kernel
    214s
  • max time network
    234s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    20-02-2022 05:42

General

  • Target

    748f2eb6ab11cdadd9a9db133aa4731c10de8c6a6f77d7da56a3e1e92615aa43.exe

  • Size

    205KB

  • MD5

    9a93f9da4f9556fde6ba47ed634bf5ca

  • SHA1

    56d1f6d60411119dbd5e58581af2440cc6acc78d

  • SHA256

    748f2eb6ab11cdadd9a9db133aa4731c10de8c6a6f77d7da56a3e1e92615aa43

  • SHA512

    9f77b6f8c0847d1a9f4aacd75bac316e204b1d18cf83d23fb189e0b6bc8ac06e1307cb0bea2d0d9d030d930fc22a9e661a6097f073168e6f3260978f7b614e9e

Score
10/10

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each network host have been encrypted with a strong algorithm. Backups were encrypted too. Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. Only we have exclusive decryption software, suitable for your situation. More than a year ago, world experts recognized the impossibility of such encryption deciphering by any means except the original decoder. No decryption software is available in the public. Antivirus companies, researchers, IT specialists, and any other persons cannot help you to decipher the data. Decryption takes from ten minutes up to several hours. It is performed automatically and doesn't require from you any actions except decoder launching. DO NOT RESET OR SHUTDOWN SYSTEM � files may be damaged. DO NOT DELETE readme files. To confirm our honest intentions. Send 2 different random files and you will get them back decrypted. It can be from different computers on your network to be sure that one key decrypts everything. We will unlock 2 files for free. To get info (decrypt your files) contact us a [email protected] or [email protected] You will receive btc address for payment in the reply letter Ryuk No system is safe

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 8 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup
    1⤵
      PID:2224
    • C:\Windows\system32\taskhostw.exe
      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
      1⤵
        PID:2276
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2816
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        PID:2948
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:2172
        • C:\Windows\system32\backgroundTaskHost.exe
          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
          1⤵
            PID:2676
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
            • Modifies registry class
            PID:2932
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:3372
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:3024
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2712
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 2712 -s 1000
                  2⤵
                  • Program crash
                  PID:4316
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p
                1⤵
                  PID:2528
                • C:\Windows\system32\sihost.exe
                  sihost.exe
                  1⤵
                  • Drops desktop.ini file(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2204
                  • C:\Windows\System32\net.exe
                    "C:\Windows\System32\net.exe" stop "spooler" /y
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4236
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop "spooler" /y
                      3⤵
                        PID:5784
                    • C:\Windows\System32\net.exe
                      "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3052
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                        3⤵
                          PID:5776
                      • C:\Windows\System32\net.exe
                        "C:\Windows\System32\net.exe" stop "samss" /y
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:5180
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop "samss" /y
                          3⤵
                            PID:5792
                        • C:\Windows\System32\net.exe
                          "C:\Windows\System32\net.exe" stop "spooler" /y
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:5800
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 stop "spooler" /y
                            3⤵
                              PID:3328
                          • C:\Windows\System32\net.exe
                            "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:5108
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                              3⤵
                                PID:4612
                            • C:\Windows\System32\net.exe
                              "C:\Windows\System32\net.exe" stop "samss" /y
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3744
                              • C:\Windows\system32\net1.exe
                                C:\Windows\system32\net1 stop "samss" /y
                                3⤵
                                  PID:5200
                              • C:\Windows\System32\net.exe
                                "C:\Windows\System32\net.exe" stop "spooler" /y
                                2⤵
                                  PID:6388
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 stop "spooler" /y
                                    3⤵
                                      PID:6440
                                  • C:\Windows\System32\net.exe
                                    "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                    2⤵
                                      PID:6460
                                      • C:\Windows\system32\net1.exe
                                        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                        3⤵
                                          PID:6512
                                      • C:\Windows\System32\net.exe
                                        "C:\Windows\System32\net.exe" stop "samss" /y
                                        2⤵
                                          PID:6532
                                          • C:\Windows\system32\net1.exe
                                            C:\Windows\system32\net1 stop "samss" /y
                                            3⤵
                                              PID:6584
                                        • C:\Users\Admin\AppData\Local\Temp\748f2eb6ab11cdadd9a9db133aa4731c10de8c6a6f77d7da56a3e1e92615aa43.exe
                                          "C:\Users\Admin\AppData\Local\Temp\748f2eb6ab11cdadd9a9db133aa4731c10de8c6a6f77d7da56a3e1e92615aa43.exe"
                                          1⤵
                                          • Checks computer location settings
                                          • Drops desktop.ini file(s)
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:1540
                                          • C:\Windows\System32\net.exe
                                            "C:\Windows\System32\net.exe" stop "spooler" /y
                                            2⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:3148
                                            • C:\Windows\system32\net1.exe
                                              C:\Windows\system32\net1 stop "spooler" /y
                                              3⤵
                                                PID:5736
                                            • C:\Windows\System32\net.exe
                                              "C:\Windows\System32\net.exe" stop "spooler" /y
                                              2⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:4532
                                              • C:\Windows\system32\net1.exe
                                                C:\Windows\system32\net1 stop "spooler" /y
                                                3⤵
                                                  PID:5768
                                              • C:\Windows\System32\net.exe
                                                "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                2⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:5496
                                                • C:\Windows\system32\net1.exe
                                                  C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                  3⤵
                                                    PID:5824
                                                • C:\Windows\System32\net.exe
                                                  "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                  2⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:5488
                                                  • C:\Windows\system32\net1.exe
                                                    C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                    3⤵
                                                      PID:5744
                                                  • C:\Windows\System32\net.exe
                                                    "C:\Windows\System32\net.exe" stop "samss" /y
                                                    2⤵
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:5840
                                                    • C:\Windows\system32\net1.exe
                                                      C:\Windows\system32\net1 stop "samss" /y
                                                      3⤵
                                                        PID:5992
                                                    • C:\Windows\System32\net.exe
                                                      "C:\Windows\System32\net.exe" stop "samss" /y
                                                      2⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:5920
                                                      • C:\Windows\system32\net1.exe
                                                        C:\Windows\system32\net1 stop "samss" /y
                                                        3⤵
                                                          PID:6000
                                                      • C:\Windows\System32\net.exe
                                                        "C:\Windows\System32\net.exe" stop "spooler" /y
                                                        2⤵
                                                          PID:4504
                                                          • C:\Windows\system32\net1.exe
                                                            C:\Windows\system32\net1 stop "spooler" /y
                                                            3⤵
                                                              PID:1428
                                                          • C:\Windows\System32\net.exe
                                                            "C:\Windows\System32\net.exe" stop "spooler" /y
                                                            2⤵
                                                              PID:684
                                                              • C:\Windows\system32\net1.exe
                                                                C:\Windows\system32\net1 stop "spooler" /y
                                                                3⤵
                                                                  PID:3288
                                                              • C:\Windows\System32\net.exe
                                                                "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                                2⤵
                                                                  PID:1220
                                                                  • C:\Windows\system32\net1.exe
                                                                    C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                                    3⤵
                                                                      PID:5352
                                                                  • C:\Windows\System32\net.exe
                                                                    "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                                    2⤵
                                                                      PID:5104
                                                                      • C:\Windows\system32\net1.exe
                                                                        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                                        3⤵
                                                                          PID:5080
                                                                      • C:\Windows\System32\net.exe
                                                                        "C:\Windows\System32\net.exe" stop "samss" /y
                                                                        2⤵
                                                                          PID:3788
                                                                          • C:\Windows\system32\net1.exe
                                                                            C:\Windows\system32\net1 stop "samss" /y
                                                                            3⤵
                                                                              PID:3476
                                                                          • C:\Windows\System32\net.exe
                                                                            "C:\Windows\System32\net.exe" stop "samss" /y
                                                                            2⤵
                                                                              PID:5148
                                                                              • C:\Windows\system32\net1.exe
                                                                                C:\Windows\system32\net1 stop "samss" /y
                                                                                3⤵
                                                                                  PID:1860
                                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                              1⤵
                                                                              • Modifies registry class
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:4616
                                                                            • C:\Windows\System32\svchost.exe
                                                                              C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                              1⤵
                                                                              • Drops file in Windows directory
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:6072

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v6

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • memory/2204-131-0x00007FF70BD10000-0x00007FF70C0A6000-memory.dmp

                                                                              Filesize

                                                                              3.6MB

                                                                            • memory/2224-132-0x00007FF70BD10000-0x00007FF70C0A6000-memory.dmp

                                                                              Filesize

                                                                              3.6MB

                                                                            • memory/2712-150-0x000001F617080000-0x000001F617088000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/2712-152-0x000001F617070000-0x000001F617071000-memory.dmp

                                                                              Filesize

                                                                              4KB