Analysis
-
max time kernel
187s -
max time network
103s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 08:47
Static task
static1
Behavioral task
behavioral1
Sample
300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe
Resource
win10v2004-en-20220112
General
-
Target
300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe
-
Size
1.4MB
-
MD5
82b1966d0d47be793b1dacf5449d5dd4
-
SHA1
f5e64f4122242c7b4068b83eaf31ce0f0806a746
-
SHA256
300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83
-
SHA512
1986630db561bcff63186e2cf3ccef34aa6a07d5286766507e31315cb57c981055b1843489b883559973d5998e482149a4ede78bcf049d96c5352b133e58f795
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 1036 OSTGDgD.exe -
Loads dropped DLL 2 IoCs
pid Process 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 1036 OSTGDgD.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 1036 OSTGDgD.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 1036 OSTGDgD.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe Token: SeBackupPrivilege 1036 OSTGDgD.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 1036 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 28 PID 320 wrote to memory of 1036 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 28 PID 320 wrote to memory of 1036 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 28 PID 320 wrote to memory of 1036 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 28 PID 320 wrote to memory of 1792 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 30 PID 320 wrote to memory of 1792 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 30 PID 320 wrote to memory of 1792 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 30 PID 320 wrote to memory of 1792 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 30 PID 1792 wrote to memory of 1052 1792 net.exe 32 PID 1792 wrote to memory of 1052 1792 net.exe 32 PID 1792 wrote to memory of 1052 1792 net.exe 32 PID 1792 wrote to memory of 1052 1792 net.exe 32 PID 320 wrote to memory of 1120 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 33 PID 320 wrote to memory of 1120 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 33 PID 320 wrote to memory of 1120 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 33 PID 320 wrote to memory of 1120 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 33 PID 1120 wrote to memory of 2020 1120 net.exe 35 PID 1120 wrote to memory of 2020 1120 net.exe 35 PID 1120 wrote to memory of 2020 1120 net.exe 35 PID 1120 wrote to memory of 2020 1120 net.exe 35 PID 320 wrote to memory of 1224 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 36 PID 320 wrote to memory of 1224 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 36 PID 320 wrote to memory of 1224 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 36 PID 320 wrote to memory of 1224 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 36 PID 1224 wrote to memory of 852 1224 net.exe 38 PID 1224 wrote to memory of 852 1224 net.exe 38 PID 1224 wrote to memory of 852 1224 net.exe 38 PID 1224 wrote to memory of 852 1224 net.exe 38 PID 320 wrote to memory of 1100 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 39 PID 320 wrote to memory of 1100 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 39 PID 320 wrote to memory of 1100 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 39 PID 320 wrote to memory of 1100 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 39 PID 1100 wrote to memory of 1184 1100 net.exe 41 PID 1100 wrote to memory of 1184 1100 net.exe 41 PID 1100 wrote to memory of 1184 1100 net.exe 41 PID 1100 wrote to memory of 1184 1100 net.exe 41 PID 1036 wrote to memory of 8536 1036 OSTGDgD.exe 42 PID 1036 wrote to memory of 8536 1036 OSTGDgD.exe 42 PID 1036 wrote to memory of 8536 1036 OSTGDgD.exe 42 PID 1036 wrote to memory of 8536 1036 OSTGDgD.exe 42 PID 8536 wrote to memory of 8560 8536 net.exe 44 PID 8536 wrote to memory of 8560 8536 net.exe 44 PID 8536 wrote to memory of 8560 8536 net.exe 44 PID 8536 wrote to memory of 8560 8536 net.exe 44 PID 320 wrote to memory of 19632 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 46 PID 320 wrote to memory of 19632 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 46 PID 320 wrote to memory of 19632 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 46 PID 320 wrote to memory of 19632 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 46 PID 19632 wrote to memory of 19656 19632 net.exe 48 PID 19632 wrote to memory of 19656 19632 net.exe 48 PID 19632 wrote to memory of 19656 19632 net.exe 48 PID 19632 wrote to memory of 19656 19632 net.exe 48 PID 320 wrote to memory of 20804 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 50 PID 320 wrote to memory of 20804 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 50 PID 320 wrote to memory of 20804 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 50 PID 320 wrote to memory of 20804 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 50 PID 20804 wrote to memory of 23672 20804 net.exe 51 PID 20804 wrote to memory of 23672 20804 net.exe 51 PID 20804 wrote to memory of 23672 20804 net.exe 51 PID 20804 wrote to memory of 23672 20804 net.exe 51 PID 320 wrote to memory of 19664 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 52 PID 320 wrote to memory of 19664 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 52 PID 320 wrote to memory of 19664 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 52 PID 320 wrote to memory of 19664 320 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe"C:\Users\Admin\AppData\Local\Temp\300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\OSTGDgD.exe"C:\Users\Admin\AppData\Local\Temp\OSTGDgD.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:8536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:8560
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:44972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:44996
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1052
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2020
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:852
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1184
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:19632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:19656
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:20804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:23672
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:19664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:628
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:1632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:19664
-
-