Analysis
-
max time kernel
180s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 08:44
Static task
static1
Behavioral task
behavioral1
Sample
310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe
Resource
win10v2004-en-20220113
General
-
Target
310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe
-
Size
170KB
-
MD5
af1f77eedf16f8a00fa500e0f8dbedbe
-
SHA1
67b3d0c7013a9ccee08e948a82dde6d0e8b01828
-
SHA256
310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0
-
SHA512
0fcf486b2acaa0c71e123871cac423feb14c100c6c81d76a3b5ebbe6014d230749e109c583f62ea0287c29b810d957d7544b5b9761f0fa1408e4e775307e5aeb
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\rjmx.jar taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrfralm.dat taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG_PAL.wmv taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-modules-appui.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\feature.properties taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable.nl_ja_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Stockholm taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Troll taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Atikokan taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Paris taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-applemenu_zh_CN.jar taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach_5.5.0.165303.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-ui.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkHandle.png taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-3 taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Wallis taskhost.exe File opened for modification C:\Program Files\SplitRename.m4v taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad.xml taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-foreground.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\jfluid-server_ja.jar taskhost.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\de-DE\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Guam taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Irkutsk taskhost.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.registry_3.5.400.v20140428-1507.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\Beulah taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Honolulu taskhost.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Auckland taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-search_ja.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-common.xml taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-templates.jar taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Yellowknife taskhost.exe File opened for modification C:\Program Files\SetSend.ps1 taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Goose_Bay taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Nipigon taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Volgograd taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.intro_3.4.200.v20130326-1254.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_zh_CN.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Ojinaga taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_ButtonGraphic.png taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.nl_zh_4.4.0.v20140623020002.jar taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-core-output2.xml_hidden taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\splash.gif taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1620 wrote to memory of 780 1620 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 27 PID 1620 wrote to memory of 780 1620 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 27 PID 1620 wrote to memory of 780 1620 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 27 PID 1620 wrote to memory of 1216 1620 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 19 PID 1620 wrote to memory of 1308 1620 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 20 PID 1620 wrote to memory of 780 1620 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 27 PID 780 wrote to memory of 860 780 cmd.exe 29 PID 780 wrote to memory of 860 780 cmd.exe 29 PID 780 wrote to memory of 860 780 cmd.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops file in Program Files directory
PID:1216
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe"C:\Users\Admin\AppData\Local\Temp\310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe" /f3⤵
- Adds Run key to start application
PID:860
-
-