Analysis
-
max time kernel
186s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 06:05
Static task
static1
Behavioral task
behavioral1
Sample
6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe
Resource
win10v2004-en-20220113
General
-
Target
6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe
-
Size
170KB
-
MD5
301b5d87092b4fc13dd4b05bff39ca9c
-
SHA1
4b8a77b3d993a0be86fe1d8aa4fdb8c15ae05ab9
-
SHA256
6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d
-
SHA512
1c508c1ccf4f3bb0cd0d9dba2af02612f4528b6d056c84f50bed65de3448f0b191bae3db953973bc75881f0805b6c3655d75b24b8e2775d096ddd115f234bfac
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
taskhost.exedescription ioc process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationLeft_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationLeft_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\content-types.properties taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\zipfs.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.ssl_1.1.0.v20140827-1444.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.jarprocessor.nl_ja_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-back-static.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_zh_CN.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Winamac taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Kiritimati taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler.xml taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationLeft_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsScenesBackground.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\localedata.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\feature.properties taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.jsp.jasper_1.0.400.v20130327-1442.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives.nl_zh_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\core_ja.jar taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-jvmstat_ja.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\LICENSE taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Tell_City taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-output2.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Sydney taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_performance_Thumbnail.bmp taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\LICENSE taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\blafdoc.css taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.syntheticattribute.exsd taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720x480icongraphic.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench_1.2.1.v20140901-1244.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-progress-ui.xml taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\cacerts taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_it.properties taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\MANIFEST.MF taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guayaquil taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\file_obj.gif taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\org-openide-modules_ja.jar taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_specialocc_Thumbnail.bmp taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push.png taskhost.exe File opened for modification C:\Program Files\ConvertToNew.TS taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Baghdad taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Istanbul taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\booklist.gif taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-windows_ja.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring-impl.xml taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_ko.properties taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\resources.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Paris taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.net_1.2.200.v20120807-0927.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-search_zh_CN.jar taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exepid process 1156 6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exedescription pid process Token: SeDebugPrivilege 1156 6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.execmd.exedescription pid process target process PID 1156 wrote to memory of 460 1156 6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe cmd.exe PID 1156 wrote to memory of 460 1156 6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe cmd.exe PID 1156 wrote to memory of 460 1156 6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe cmd.exe PID 1156 wrote to memory of 1248 1156 6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe taskhost.exe PID 460 wrote to memory of 612 460 cmd.exe reg.exe PID 460 wrote to memory of 612 460 cmd.exe reg.exe PID 460 wrote to memory of 612 460 cmd.exe reg.exe PID 1156 wrote to memory of 1368 1156 6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe Dwm.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops file in Program Files directory
PID:1248
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe"C:\Users\Admin\AppData\Local\Temp\6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\6d768a860ccf91cc9cb4d127dd648d3b91d99e8c3467a8c45e5b0eb2a01acc3d.exe" /f3⤵
- Adds Run key to start application
PID:612
-
-