Analysis
-
max time kernel
177s -
max time network
226s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 08:29
Static task
static1
Behavioral task
behavioral1
Sample
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe
Resource
win10v2004-en-20220113
General
-
Target
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe
-
Size
117KB
-
MD5
045eb328ff30b09cebd6fe3c031db7bc
-
SHA1
b28cd818c54d7a4f5416728a8f8408e6c9c40bc2
-
SHA256
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99
-
SHA512
6f612366761abc5017dfdb6db985736f059fc21c8b6ab6816d379357cca7f9f1ff14690ddb71179e9771e58e0a5eb85d2765b58e8057666b497a7420658ae8e9
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 3 IoCs
pid Process 1688 OKIzIqFIfrep.exe 392 WffDgOMpjlan.exe 1944 FBbBrmbdQlan.exe -
Loads dropped DLL 6 IoCs
pid Process 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 26188 icacls.exe 26196 icacls.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\RyukReadMe.html 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe File opened for modification C:\Program Files\7-Zip\RyukReadMe.html 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1688 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 29 PID 1544 wrote to memory of 1688 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 29 PID 1544 wrote to memory of 1688 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 29 PID 1544 wrote to memory of 1688 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 29 PID 1544 wrote to memory of 392 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 30 PID 1544 wrote to memory of 392 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 30 PID 1544 wrote to memory of 392 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 30 PID 1544 wrote to memory of 392 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 30 PID 1544 wrote to memory of 1944 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 31 PID 1544 wrote to memory of 1944 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 31 PID 1544 wrote to memory of 1944 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 31 PID 1544 wrote to memory of 1944 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 31 PID 1544 wrote to memory of 26188 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 32 PID 1544 wrote to memory of 26188 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 32 PID 1544 wrote to memory of 26188 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 32 PID 1544 wrote to memory of 26188 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 32 PID 1544 wrote to memory of 26196 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 33 PID 1544 wrote to memory of 26196 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 33 PID 1544 wrote to memory of 26196 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 33 PID 1544 wrote to memory of 26196 1544 379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe"C:\Users\Admin\AppData\Local\Temp\379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\OKIzIqFIfrep.exe"C:\Users\Admin\AppData\Local\Temp\OKIzIqFIfrep.exe" 9 REP2⤵
- Executes dropped EXE
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\WffDgOMpjlan.exe"C:\Users\Admin\AppData\Local\Temp\WffDgOMpjlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\FBbBrmbdQlan.exe"C:\Users\Admin\AppData\Local\Temp\FBbBrmbdQlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:1944
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:26188
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:26196
-