General
-
Target
3b37696309e8ff7dd21717ff9edfcfab3840e62236b49a1cf6f470ee9074faf8
-
Size
193KB
-
Sample
220220-j8v43sbeer
-
MD5
cb5e16ee3c210f4112a244b577c749ba
-
SHA1
5f8b636dcc5ad2a77fe96923cdce67277b584317
-
SHA256
3b37696309e8ff7dd21717ff9edfcfab3840e62236b49a1cf6f470ee9074faf8
-
SHA512
5ca67a4df63a73fa1062c89b9f114fc4e828597ff67d1679c0bb7bbcddb66d04d8ed02b91b5e1ec210196b2e4a8331d3564e65fd6149dfb3af0144cc12131bf3
Static task
static1
Behavioral task
behavioral1
Sample
3b37696309e8ff7dd21717ff9edfcfab3840e62236b49a1cf6f470ee9074faf8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3b37696309e8ff7dd21717ff9edfcfab3840e62236b49a1cf6f470ee9074faf8.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Targets
-
-
Target
3b37696309e8ff7dd21717ff9edfcfab3840e62236b49a1cf6f470ee9074faf8
-
Size
193KB
-
MD5
cb5e16ee3c210f4112a244b577c749ba
-
SHA1
5f8b636dcc5ad2a77fe96923cdce67277b584317
-
SHA256
3b37696309e8ff7dd21717ff9edfcfab3840e62236b49a1cf6f470ee9074faf8
-
SHA512
5ca67a4df63a73fa1062c89b9f114fc4e828597ff67d1679c0bb7bbcddb66d04d8ed02b91b5e1ec210196b2e4a8331d3564e65fd6149dfb3af0144cc12131bf3
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-