Analysis
-
max time kernel
180s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 07:39
Static task
static1
Behavioral task
behavioral1
Sample
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe
Resource
win10v2004-en-20220113
General
-
Target
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe
-
Size
188KB
-
MD5
d2d3d877e06b0181b67c6e610b40c44c
-
SHA1
6a0dd2ab04d5b0b6869d5b7d9b4eb591087bace9
-
SHA256
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539
-
SHA512
320cc4f1862425d706c4d369fa5f13a62cc9f3454dae91b239a28440c14dd92972b8d1cfa4fea699dc996e67c3a4db49b4c4ed6e63329492ee6cf8f4f7059cf0
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
Processes:
JukCrnS.exepid process 520 JukCrnS.exe -
Loads dropped DLL 2 IoCs
Processes:
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exepid process 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exeJukCrnS.exepid process 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 520 JukCrnS.exe 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 520 JukCrnS.exe 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe 520 JukCrnS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exeJukCrnS.exedescription pid process Token: SeBackupPrivilege 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe Token: SeBackupPrivilege 520 JukCrnS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exenet.exenet.exenet.exenet.exeJukCrnS.exenet.exenet.exenet.exedescription pid process target process PID 1916 wrote to memory of 520 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe JukCrnS.exe PID 1916 wrote to memory of 520 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe JukCrnS.exe PID 1916 wrote to memory of 520 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe JukCrnS.exe PID 1916 wrote to memory of 520 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe JukCrnS.exe PID 1916 wrote to memory of 320 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 320 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 320 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 320 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 320 wrote to memory of 548 320 net.exe net1.exe PID 320 wrote to memory of 548 320 net.exe net1.exe PID 320 wrote to memory of 548 320 net.exe net1.exe PID 320 wrote to memory of 548 320 net.exe net1.exe PID 1916 wrote to memory of 536 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 536 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 536 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 536 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 536 wrote to memory of 1516 536 net.exe net1.exe PID 536 wrote to memory of 1516 536 net.exe net1.exe PID 536 wrote to memory of 1516 536 net.exe net1.exe PID 536 wrote to memory of 1516 536 net.exe net1.exe PID 1916 wrote to memory of 928 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 928 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 928 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 928 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 928 wrote to memory of 512 928 net.exe net1.exe PID 928 wrote to memory of 512 928 net.exe net1.exe PID 928 wrote to memory of 512 928 net.exe net1.exe PID 928 wrote to memory of 512 928 net.exe net1.exe PID 1916 wrote to memory of 860 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 860 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 860 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 860 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 860 wrote to memory of 1452 860 net.exe net1.exe PID 860 wrote to memory of 1452 860 net.exe net1.exe PID 860 wrote to memory of 1452 860 net.exe net1.exe PID 860 wrote to memory of 1452 860 net.exe net1.exe PID 520 wrote to memory of 2544 520 JukCrnS.exe net.exe PID 520 wrote to memory of 2544 520 JukCrnS.exe net.exe PID 520 wrote to memory of 2544 520 JukCrnS.exe net.exe PID 520 wrote to memory of 2544 520 JukCrnS.exe net.exe PID 2544 wrote to memory of 2568 2544 net.exe net1.exe PID 2544 wrote to memory of 2568 2544 net.exe net1.exe PID 2544 wrote to memory of 2568 2544 net.exe net1.exe PID 2544 wrote to memory of 2568 2544 net.exe net1.exe PID 1916 wrote to memory of 2700 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 2700 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 2700 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 2700 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 1456 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 1456 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 1456 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1916 wrote to memory of 1456 1916 4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe net.exe PID 1456 wrote to memory of 9400 1456 net.exe net1.exe PID 1456 wrote to memory of 9400 1456 net.exe net1.exe PID 1456 wrote to memory of 9400 1456 net.exe net1.exe PID 1456 wrote to memory of 9400 1456 net.exe net1.exe PID 2700 wrote to memory of 9408 2700 net.exe net1.exe PID 2700 wrote to memory of 9408 2700 net.exe net1.exe PID 2700 wrote to memory of 9408 2700 net.exe net1.exe PID 2700 wrote to memory of 9408 2700 net.exe net1.exe PID 520 wrote to memory of 9468 520 JukCrnS.exe net.exe PID 520 wrote to memory of 9468 520 JukCrnS.exe net.exe PID 520 wrote to memory of 9468 520 JukCrnS.exe net.exe PID 520 wrote to memory of 9468 520 JukCrnS.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe"C:\Users\Admin\AppData\Local\Temp\4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\JukCrnS.exe"C:\Users\Admin\AppData\Local\Temp\JukCrnS.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:2568
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:9468
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:9492
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:23592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:23632
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:548
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1516
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:512
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1452
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:9400
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:9408
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:24528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:24568
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:24520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:23568
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_bc8e1036-7fb3-448e-8ad9-a824b1a03b8e
MD593a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
MD5
d2d3d877e06b0181b67c6e610b40c44c
SHA16a0dd2ab04d5b0b6869d5b7d9b4eb591087bace9
SHA2564b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539
SHA512320cc4f1862425d706c4d369fa5f13a62cc9f3454dae91b239a28440c14dd92972b8d1cfa4fea699dc996e67c3a4db49b4c4ed6e63329492ee6cf8f4f7059cf0
-
MD5
9272789784b6e871f6776984e0e1061c
SHA16631af3402f126d6fc49cb6d9e73d63ef3f329b3
SHA256255e145cba8b7ac0c7d1b82be87cb09f841cff07808895a7b592a04ead1aee0a
SHA512af6935acb607119c5bd88be90e84f712da03b5cc805d440ae581e3c03a0fe0b4749938f306f55a66714446e2501a6feaf603e7990f45104a3f363b552ad77f68
-
MD5
d2d3d877e06b0181b67c6e610b40c44c
SHA16a0dd2ab04d5b0b6869d5b7d9b4eb591087bace9
SHA2564b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539
SHA512320cc4f1862425d706c4d369fa5f13a62cc9f3454dae91b239a28440c14dd92972b8d1cfa4fea699dc996e67c3a4db49b4c4ed6e63329492ee6cf8f4f7059cf0
-
MD5
d2d3d877e06b0181b67c6e610b40c44c
SHA16a0dd2ab04d5b0b6869d5b7d9b4eb591087bace9
SHA2564b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539
SHA512320cc4f1862425d706c4d369fa5f13a62cc9f3454dae91b239a28440c14dd92972b8d1cfa4fea699dc996e67c3a4db49b4c4ed6e63329492ee6cf8f4f7059cf0