Analysis
-
max time kernel
169s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 07:08
Static task
static1
Behavioral task
behavioral1
Sample
57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe
Resource
win10v2004-en-20220112
General
-
Target
57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe
-
Size
171KB
-
MD5
643edd16a075087e1f52c90520191966
-
SHA1
e40f903c67de534bc0a3b0ca7bd86eed321381e6
-
SHA256
57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14
-
SHA512
48a05089ef89cf4509a656b30045e8bd200366d09ffcd15ab92e9b1e3ee5d9395f471370670cd2eeec6dda65897f1576e4ccd9cee5bc674e85d55df47258e5a6
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
brenda_matthews_1976@protonmail.com
josh.carinoso83@protonmail.com
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exepid process 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exedescription pid process Token: SeDebugPrivilege 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe Token: SeBackupPrivilege 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 268 wrote to memory of 1220 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe taskhost.exe PID 268 wrote to memory of 1312 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe Dwm.exe PID 268 wrote to memory of 2080 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2080 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2080 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2080 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2088 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2088 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2088 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2088 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2192 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2192 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2192 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2192 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2216 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2216 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2216 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 2216 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 2216 wrote to memory of 2684 2216 net.exe net1.exe PID 2216 wrote to memory of 2684 2216 net.exe net1.exe PID 2216 wrote to memory of 2684 2216 net.exe net1.exe PID 2216 wrote to memory of 2684 2216 net.exe net1.exe PID 2080 wrote to memory of 2676 2080 net.exe net1.exe PID 2080 wrote to memory of 2676 2080 net.exe net1.exe PID 2080 wrote to memory of 2676 2080 net.exe net1.exe PID 2080 wrote to memory of 2676 2080 net.exe net1.exe PID 2088 wrote to memory of 2692 2088 net.exe net1.exe PID 2088 wrote to memory of 2692 2088 net.exe net1.exe PID 2088 wrote to memory of 2692 2088 net.exe net1.exe PID 2088 wrote to memory of 2692 2088 net.exe net1.exe PID 2192 wrote to memory of 2700 2192 net.exe net1.exe PID 2192 wrote to memory of 2700 2192 net.exe net1.exe PID 2192 wrote to memory of 2700 2192 net.exe net1.exe PID 2192 wrote to memory of 2700 2192 net.exe net1.exe PID 268 wrote to memory of 6688 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 6688 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 6688 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 6688 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 6712 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 6712 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 6712 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 6712 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 6688 wrote to memory of 6740 6688 net.exe net1.exe PID 6688 wrote to memory of 6740 6688 net.exe net1.exe PID 6688 wrote to memory of 6740 6688 net.exe net1.exe PID 6688 wrote to memory of 6740 6688 net.exe net1.exe PID 6712 wrote to memory of 6748 6712 net.exe net1.exe PID 6712 wrote to memory of 6748 6712 net.exe net1.exe PID 6712 wrote to memory of 6748 6712 net.exe net1.exe PID 6712 wrote to memory of 6748 6712 net.exe net1.exe PID 268 wrote to memory of 8612 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 8612 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 8612 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 8612 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 8620 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 8620 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 8620 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 268 wrote to memory of 8620 268 57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe net.exe PID 8620 wrote to memory of 8660 8620 net.exe net1.exe PID 8620 wrote to memory of 8660 8620 net.exe net1.exe PID 8620 wrote to memory of 8660 8620 net.exe net1.exe PID 8620 wrote to memory of 8660 8620 net.exe net1.exe PID 8612 wrote to memory of 8668 8612 net.exe net1.exe PID 8612 wrote to memory of 8668 8612 net.exe net1.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe"C:\Users\Admin\AppData\Local\Temp\57ae2c58e9a78ce3021c7ed801b3e7f0eada5eeb070c519f573ff9d8bb09ca14.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵