Analysis
-
max time kernel
168s -
max time network
44s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 08:04
Static task
static1
Behavioral task
behavioral1
Sample
413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe
Resource
win10v2004-en-20220113
General
-
Target
413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe
-
Size
351KB
-
MD5
efd0d3409e5e7ffe94f931ff6f09035e
-
SHA1
c7830b5cadb9320bc8b9876d84acb4e13f90434a
-
SHA256
413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7
-
SHA512
a60fa47ed884327adf98c3ed3e67cf0149678f6c2cf74c3c6c627e579067ad4636afe122fd246fbf0613889af46a096d3656932a4bcad52a12803ff0950b9386
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
1CN2iQbBikFK9jM34Nb3WLx5DCenQLnbXp
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 520 LCDyJ.exe -
Deletes itself 1 IoCs
pid Process 520 LCDyJ.exe -
Loads dropped DLL 1 IoCs
pid Process 1796 413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\LCDyJ.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.zh_CN_5.5.0.165303.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sa_ja.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\St_Johns taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-9 taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\vlc.mo taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_SelectionSubpicture.png taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Rio_Gallegos taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\1047x576black.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\com-sun-tools-visualvm-modules-startup.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Cambridge_Bay taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-snaptracer_zh_CN.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Cayenne taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Norfolk taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\vlc.mo taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui_5.5.0.165303.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.jasper.glassfish_2.2.2.v201205150955.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-nodes.xml taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_zh_HK.properties taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+3 taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jvmticmlr.h taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Warsaw taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-plaf.xml taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Jerusalem taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins.nl_zh_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-ui_ja.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-tabcontrol.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-compat.jar taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\PublisherMUI.XML taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\rarrow.gif taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_zh_CN.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-openide-compat.xml_hidden taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Accessibility.api taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Antigua taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\La_Rioja taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Beirut taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\THMBNAIL.PNG taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\MS.EPS taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\THMBNAIL.PNG taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Maputo taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Fortaleza taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.pdf taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1040\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-charts.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup_ja.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-keyring-impl.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-text.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-keyring.xml taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\DigSig.api taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\WATER.INF taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_jpn.xml taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-highlight.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.emf.ecore.xmi_2.10.1.v20140901-1043.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\RyukReadMe.txt taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 520 LCDyJ.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 520 LCDyJ.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1796 wrote to memory of 520 1796 413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe 27 PID 1796 wrote to memory of 520 1796 413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe 27 PID 1796 wrote to memory of 520 1796 413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe 27 PID 1796 wrote to memory of 520 1796 413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe 27 PID 520 wrote to memory of 640 520 LCDyJ.exe 28 PID 520 wrote to memory of 640 520 LCDyJ.exe 28 PID 520 wrote to memory of 640 520 LCDyJ.exe 28 PID 520 wrote to memory of 1276 520 LCDyJ.exe 18 PID 520 wrote to memory of 1376 520 LCDyJ.exe 17 PID 520 wrote to memory of 640 520 LCDyJ.exe 28 PID 640 wrote to memory of 1472 640 cmd.exe 30 PID 640 wrote to memory of 1472 640 cmd.exe 30 PID 640 wrote to memory of 1472 640 cmd.exe 30
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1376
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops file in Program Files directory
PID:1276
-
C:\Users\Admin\AppData\Local\Temp\413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe"C:\Users\Admin\AppData\Local\Temp\413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\users\Public\LCDyJ.exe"C:\users\Public\LCDyJ.exe" C:\Users\Admin\AppData\Local\Temp\413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\LCDyJ.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\LCDyJ.exe" /f4⤵
- Adds Run key to start application
PID:1472
-
-
-