Analysis

  • max time kernel
    164s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    20-02-2022 09:09

General

  • Target

    27661d53ec6d5e1938d85b9094c94ac51d0b82e849cffeaf261abb3ccde48e5e.dll

  • Size

    134KB

  • MD5

    b1ef5d407cdc3dab603735e862d0ba45

  • SHA1

    656ebac8cb7fed5ca33b7fccf18aa0a3265eb0f8

  • SHA256

    27661d53ec6d5e1938d85b9094c94ac51d0b82e849cffeaf261abb3ccde48e5e

  • SHA512

    c728dbaae2e3bc8d057b2d679c401b2239f79ab5f398b246e358f5604215ecdf9bf598469f69d284fa3b7da1d0ccbef5c213aced739fa001d618c3ae35f0e096

Malware Config

Extracted

Path

C:\$Recycle.Bin\RyukReadMe.html

Family

ryuk

Ransom Note
contact balance of shadow universe Ryuk $password = 'tKPGaxUEJ1'; $torlink = 'http://oc6mkf4efqrjp2ue6qp6vmz4ofyjmlo6dtqiklqb2q546bnqeu66tbyd.onion'; function info(){alert("INSTRUCTION:\r\n1. Download tor browser.\r\n2. Open link through tor browser: " + $torlink + "\r\n3. Fill the form, your password: "+ $password +"\r\nWe will contact you shortly.\r\nAlways send files for test decryption.");};
URLs

http://oc6mkf4efqrjp2ue6qp6vmz4ofyjmlo6dtqiklqb2q546bnqeu66tbyd.onion

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\27661d53ec6d5e1938d85b9094c94ac51d0b82e849cffeaf261abb3ccde48e5e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\27661d53ec6d5e1938d85b9094c94ac51d0b82e849cffeaf261abb3ccde48e5e.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\SysWOW64\kzezATpbFrep.exe
        "C:\Windows\SysWOW64\kzezATpbFrep.exe" 9 REP
        3⤵
        • Executes dropped EXE
        PID:516
      • C:\Windows\SysWOW64\TVykZJRTzlan.exe
        "C:\Windows\SysWOW64\TVykZJRTzlan.exe" 8 LAN
        3⤵
        • Executes dropped EXE
        PID:844
      • C:\Windows\SysWOW64\KGcrQOKRRlan.exe
        "C:\Windows\SysWOW64\KGcrQOKRRlan.exe" 8 LAN
        3⤵
        • Executes dropped EXE
        PID:612
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\*" /grant Everyone:F /T /C /Q
        3⤵
        • Modifies file permissions
        PID:1628
      • C:\Windows\SysWOW64\icacls.exe
        icacls "D:\*" /grant Everyone:F /T /C /Q
        3⤵
        • Modifies file permissions
        PID:1640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-55-0x0000000075321000-0x0000000075323000-memory.dmp

    Filesize

    8KB

  • memory/1672-56-0x0000000035000000-0x0000000035029000-memory.dmp

    Filesize

    164KB