Analysis
-
max time kernel
184s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 05:43
Static task
static1
Behavioral task
behavioral1
Sample
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe
Resource
win10v2004-en-20220113
General
-
Target
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe
-
Size
189KB
-
MD5
090826c3c34fb53a639f1d2919e1b44c
-
SHA1
ab355fed7323cb1dfaf1e32833acd77ffa23c287
-
SHA256
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030
-
SHA512
d0ac51019f6d2652ae285b99fb68cbe5e3f2acf9cfa30b9d26d95e9692a5562fb8e5f5656afb55c71d191617be4336dd9b4dd7dad8b5f9107f7c9fd4789a7720
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
Processes:
PqdfzJO.exepid process 1148 PqdfzJO.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exePqdfzJO.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation PqdfzJO.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exepid process 4512 icacls.exe 4756 icacls.exe 4752 icacls.exe 2372 icacls.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\PqdfzJO.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exePqdfzJO.exepid process 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1148 PqdfzJO.exe 1148 PqdfzJO.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1148 PqdfzJO.exe 1148 PqdfzJO.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exePqdfzJO.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe Token: SeBackupPrivilege 1148 PqdfzJO.exe Token: SeBackupPrivilege 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe Token: SeIncreaseQuotaPrivilege 3568 WMIC.exe Token: SeSecurityPrivilege 3568 WMIC.exe Token: SeTakeOwnershipPrivilege 3568 WMIC.exe Token: SeLoadDriverPrivilege 3568 WMIC.exe Token: SeSystemProfilePrivilege 3568 WMIC.exe Token: SeSystemtimePrivilege 3568 WMIC.exe Token: SeProfSingleProcessPrivilege 3568 WMIC.exe Token: SeIncBasePriorityPrivilege 3568 WMIC.exe Token: SeCreatePagefilePrivilege 3568 WMIC.exe Token: SeBackupPrivilege 3568 WMIC.exe Token: SeRestorePrivilege 3568 WMIC.exe Token: SeShutdownPrivilege 3568 WMIC.exe Token: SeDebugPrivilege 3568 WMIC.exe Token: SeSystemEnvironmentPrivilege 3568 WMIC.exe Token: SeRemoteShutdownPrivilege 3568 WMIC.exe Token: SeUndockPrivilege 3568 WMIC.exe Token: SeManageVolumePrivilege 3568 WMIC.exe Token: 33 3568 WMIC.exe Token: 34 3568 WMIC.exe Token: 35 3568 WMIC.exe Token: 36 3568 WMIC.exe Token: SeIncreaseQuotaPrivilege 3720 WMIC.exe Token: SeSecurityPrivilege 3720 WMIC.exe Token: SeTakeOwnershipPrivilege 3720 WMIC.exe Token: SeLoadDriverPrivilege 3720 WMIC.exe Token: SeSystemProfilePrivilege 3720 WMIC.exe Token: SeSystemtimePrivilege 3720 WMIC.exe Token: SeProfSingleProcessPrivilege 3720 WMIC.exe Token: SeIncBasePriorityPrivilege 3720 WMIC.exe Token: SeCreatePagefilePrivilege 3720 WMIC.exe Token: SeBackupPrivilege 3720 WMIC.exe Token: SeRestorePrivilege 3720 WMIC.exe Token: SeShutdownPrivilege 3720 WMIC.exe Token: SeDebugPrivilege 3720 WMIC.exe Token: SeSystemEnvironmentPrivilege 3720 WMIC.exe Token: SeRemoteShutdownPrivilege 3720 WMIC.exe Token: SeUndockPrivilege 3720 WMIC.exe Token: SeManageVolumePrivilege 3720 WMIC.exe Token: 33 3720 WMIC.exe Token: 34 3720 WMIC.exe Token: 35 3720 WMIC.exe Token: 36 3720 WMIC.exe Token: SeIncreaseQuotaPrivilege 3568 WMIC.exe Token: SeSecurityPrivilege 3568 WMIC.exe Token: SeTakeOwnershipPrivilege 3568 WMIC.exe Token: SeLoadDriverPrivilege 3568 WMIC.exe Token: SeSystemProfilePrivilege 3568 WMIC.exe Token: SeSystemtimePrivilege 3568 WMIC.exe Token: SeProfSingleProcessPrivilege 3568 WMIC.exe Token: SeIncBasePriorityPrivilege 3568 WMIC.exe Token: SeCreatePagefilePrivilege 3568 WMIC.exe Token: SeBackupPrivilege 3568 WMIC.exe Token: SeRestorePrivilege 3568 WMIC.exe Token: SeShutdownPrivilege 3568 WMIC.exe Token: SeDebugPrivilege 3568 WMIC.exe Token: SeSystemEnvironmentPrivilege 3568 WMIC.exe Token: SeRemoteShutdownPrivilege 3568 WMIC.exe Token: SeUndockPrivilege 3568 WMIC.exe Token: SeManageVolumePrivilege 3568 WMIC.exe Token: 33 3568 WMIC.exe Token: 34 3568 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exenet.exenet.exePqdfzJO.execmd.exenet.exenet.exedescription pid process target process PID 1392 wrote to memory of 1148 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe PqdfzJO.exe PID 1392 wrote to memory of 1148 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe PqdfzJO.exe PID 1392 wrote to memory of 1148 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe PqdfzJO.exe PID 1392 wrote to memory of 2344 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe sihost.exe PID 1392 wrote to memory of 4800 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe net.exe PID 1392 wrote to memory of 4800 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe net.exe PID 1392 wrote to memory of 4800 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe net.exe PID 1392 wrote to memory of 2380 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe svchost.exe PID 1392 wrote to memory of 2440 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe taskhostw.exe PID 1392 wrote to memory of 2992 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe svchost.exe PID 1392 wrote to memory of 3284 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe DllHost.exe PID 1392 wrote to memory of 3372 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe StartMenuExperienceHost.exe PID 1392 wrote to memory of 3452 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe RuntimeBroker.exe PID 1392 wrote to memory of 4820 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe net.exe PID 1392 wrote to memory of 4820 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe net.exe PID 1392 wrote to memory of 4820 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe net.exe PID 1392 wrote to memory of 3548 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe SearchApp.exe PID 1392 wrote to memory of 3832 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe RuntimeBroker.exe PID 1392 wrote to memory of 2032 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe RuntimeBroker.exe PID 1392 wrote to memory of 3736 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe backgroundTaskHost.exe PID 1392 wrote to memory of 3732 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe backgroundTaskHost.exe PID 1392 wrote to memory of 1316 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe RuntimeBroker.exe PID 4820 wrote to memory of 4452 4820 net.exe net1.exe PID 4820 wrote to memory of 4452 4820 net.exe net1.exe PID 4820 wrote to memory of 4452 4820 net.exe net1.exe PID 4800 wrote to memory of 804 4800 net.exe net1.exe PID 4800 wrote to memory of 804 4800 net.exe net1.exe PID 4800 wrote to memory of 804 4800 net.exe net1.exe PID 1148 wrote to memory of 4756 1148 PqdfzJO.exe icacls.exe PID 1148 wrote to memory of 4756 1148 PqdfzJO.exe icacls.exe PID 1148 wrote to memory of 4756 1148 PqdfzJO.exe icacls.exe PID 1148 wrote to memory of 4752 1148 PqdfzJO.exe icacls.exe PID 1148 wrote to memory of 4752 1148 PqdfzJO.exe icacls.exe PID 1148 wrote to memory of 4752 1148 PqdfzJO.exe icacls.exe PID 1148 wrote to memory of 4160 1148 PqdfzJO.exe cmd.exe PID 1148 wrote to memory of 4160 1148 PqdfzJO.exe cmd.exe PID 1148 wrote to memory of 4160 1148 PqdfzJO.exe cmd.exe PID 4160 wrote to memory of 3568 4160 cmd.exe WMIC.exe PID 4160 wrote to memory of 3568 4160 cmd.exe WMIC.exe PID 4160 wrote to memory of 3568 4160 cmd.exe WMIC.exe PID 1148 wrote to memory of 3580 1148 PqdfzJO.exe net.exe PID 1148 wrote to memory of 3580 1148 PqdfzJO.exe net.exe PID 1148 wrote to memory of 3580 1148 PqdfzJO.exe net.exe PID 3580 wrote to memory of 1236 3580 net.exe net1.exe PID 3580 wrote to memory of 1236 3580 net.exe net1.exe PID 3580 wrote to memory of 1236 3580 net.exe net1.exe PID 1148 wrote to memory of 4564 1148 PqdfzJO.exe net.exe PID 1148 wrote to memory of 4564 1148 PqdfzJO.exe net.exe PID 1148 wrote to memory of 4564 1148 PqdfzJO.exe net.exe PID 4564 wrote to memory of 4000 4564 net.exe net1.exe PID 4564 wrote to memory of 4000 4564 net.exe net1.exe PID 4564 wrote to memory of 4000 4564 net.exe net1.exe PID 1392 wrote to memory of 2372 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe icacls.exe PID 1392 wrote to memory of 2372 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe icacls.exe PID 1392 wrote to memory of 2372 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe icacls.exe PID 1392 wrote to memory of 4512 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe icacls.exe PID 1392 wrote to memory of 4512 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe icacls.exe PID 1392 wrote to memory of 4512 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe icacls.exe PID 1392 wrote to memory of 4532 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe cmd.exe PID 1392 wrote to memory of 4532 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe cmd.exe PID 1392 wrote to memory of 4532 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe cmd.exe PID 1392 wrote to memory of 3448 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe net.exe PID 1392 wrote to memory of 3448 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe net.exe PID 1392 wrote to memory of 3448 1392 7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe net.exe
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe"C:\Users\Admin\AppData\Local\Temp\7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exe"C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exe" 8 LAN2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c "WMIC.exe shadowcopy delet"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC.exe shadowcopy delet4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exe" /f /reg:643⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exe" /f /reg:644⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c "WMIC.exe shadowcopy delet"2⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC.exe shadowcopy delet3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe" /f /reg:643⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_e269d2c1-0edf-4391-ac7b-818b8e88b04fMD5
93a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
C:\Users\Admin\.oracle_jre_usage\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\3D Objects\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Adobe\Acrobat\DC\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Adobe\Color\Profiles\wscRGB.iccMD5
c9e68ed326520b4ad5ff9f00576e1b09
SHA14189465ad4d3563eebe685d01e87ca55e7e085dd
SHA256d2d79fb3e3095eefd2a8c29f499157f80df66e2a9b61bf37285d4c6841c49eab
SHA5123a97934055a60fc58259d26a272d33a43c374aacf5bd762521020bd1f97b4b0159dde594e15cbc4b3a16be8b4b0dddc5ef529630bc38a4e37c1d6a281d3d5c57
-
C:\Users\Admin\AppData\Local\Adobe\Color\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Adobe\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Microsoft\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\Low\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exeMD5
090826c3c34fb53a639f1d2919e1b44c
SHA1ab355fed7323cb1dfaf1e32833acd77ffa23c287
SHA2567465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030
SHA512d0ac51019f6d2652ae285b99fb68cbe5e3f2acf9cfa30b9d26d95e9692a5562fb8e5f5656afb55c71d191617be4336dd9b4dd7dad8b5f9107f7c9fd4789a7720
-
C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exeMD5
090826c3c34fb53a639f1d2919e1b44c
SHA1ab355fed7323cb1dfaf1e32833acd77ffa23c287
SHA2567465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030
SHA512d0ac51019f6d2652ae285b99fb68cbe5e3f2acf9cfa30b9d26d95e9692a5562fb8e5f5656afb55c71d191617be4336dd9b4dd7dad8b5f9107f7c9fd4789a7720
-
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09
-
C:\Users\RyukReadMe.htmlMD5
8d23eb184e108fbd3fdd93df2cb2be6e
SHA16109f3336c87bac6488a193625ffd9019b209346
SHA256055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957
SHA5127c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09