Analysis
-
max time kernel
197s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
20-02-2022 08:47
Static task
static1
Behavioral task
behavioral1
Sample
300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe
Resource
win10v2004-en-20220112
General
-
Target
300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe
-
Size
1.4MB
-
MD5
82b1966d0d47be793b1dacf5449d5dd4
-
SHA1
f5e64f4122242c7b4068b83eaf31ce0f0806a746
-
SHA256
300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83
-
SHA512
1986630db561bcff63186e2cf3ccef34aa6a07d5286766507e31315cb57c981055b1843489b883559973d5998e482149a4ede78bcf049d96c5352b133e58f795
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 392 LilTEpX.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation LilTEpX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 392 LilTEpX.exe 392 LilTEpX.exe 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 392 LilTEpX.exe 392 LilTEpX.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe Token: SeBackupPrivilege 392 LilTEpX.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 392 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 66 PID 2096 wrote to memory of 392 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 66 PID 2096 wrote to memory of 392 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 66 PID 2096 wrote to memory of 1072 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 67 PID 2096 wrote to memory of 1072 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 67 PID 2096 wrote to memory of 1072 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 67 PID 2096 wrote to memory of 1816 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 71 PID 2096 wrote to memory of 1816 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 71 PID 2096 wrote to memory of 1816 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 71 PID 2096 wrote to memory of 544 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 72 PID 2096 wrote to memory of 544 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 72 PID 2096 wrote to memory of 544 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 72 PID 392 wrote to memory of 364 392 LilTEpX.exe 73 PID 392 wrote to memory of 364 392 LilTEpX.exe 73 PID 392 wrote to memory of 364 392 LilTEpX.exe 73 PID 2096 wrote to memory of 396 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 74 PID 2096 wrote to memory of 396 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 74 PID 2096 wrote to memory of 396 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 74 PID 392 wrote to memory of 2808 392 LilTEpX.exe 77 PID 392 wrote to memory of 2808 392 LilTEpX.exe 77 PID 392 wrote to memory of 2808 392 LilTEpX.exe 77 PID 1072 wrote to memory of 2452 1072 net.exe 83 PID 1072 wrote to memory of 2452 1072 net.exe 83 PID 1072 wrote to memory of 2452 1072 net.exe 83 PID 544 wrote to memory of 688 544 net.exe 81 PID 544 wrote to memory of 688 544 net.exe 81 PID 544 wrote to memory of 688 544 net.exe 81 PID 1816 wrote to memory of 3888 1816 net.exe 79 PID 1816 wrote to memory of 3888 1816 net.exe 79 PID 1816 wrote to memory of 3888 1816 net.exe 79 PID 2808 wrote to memory of 3600 2808 net.exe 80 PID 2808 wrote to memory of 3600 2808 net.exe 80 PID 2808 wrote to memory of 3600 2808 net.exe 80 PID 396 wrote to memory of 2848 396 net.exe 82 PID 396 wrote to memory of 2848 396 net.exe 82 PID 396 wrote to memory of 2848 396 net.exe 82 PID 364 wrote to memory of 1880 364 net.exe 84 PID 364 wrote to memory of 1880 364 net.exe 84 PID 364 wrote to memory of 1880 364 net.exe 84 PID 2096 wrote to memory of 3452 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 91 PID 2096 wrote to memory of 3452 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 91 PID 2096 wrote to memory of 3452 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 91 PID 2096 wrote to memory of 2924 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 90 PID 2096 wrote to memory of 2924 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 90 PID 2096 wrote to memory of 2924 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 90 PID 3452 wrote to memory of 2576 3452 net.exe 95 PID 3452 wrote to memory of 2576 3452 net.exe 95 PID 3452 wrote to memory of 2576 3452 net.exe 95 PID 2924 wrote to memory of 2104 2924 net.exe 94 PID 2924 wrote to memory of 2104 2924 net.exe 94 PID 2924 wrote to memory of 2104 2924 net.exe 94 PID 2096 wrote to memory of 4248 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 96 PID 2096 wrote to memory of 4248 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 96 PID 2096 wrote to memory of 4248 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 96 PID 2096 wrote to memory of 4260 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 97 PID 2096 wrote to memory of 4260 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 97 PID 2096 wrote to memory of 4260 2096 300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe 97 PID 4248 wrote to memory of 2416 4248 net.exe 101 PID 4248 wrote to memory of 2416 4248 net.exe 101 PID 4248 wrote to memory of 2416 4248 net.exe 101 PID 4260 wrote to memory of 1160 4260 net.exe 100 PID 4260 wrote to memory of 1160 4260 net.exe 100 PID 4260 wrote to memory of 1160 4260 net.exe 100 PID 392 wrote to memory of 5648 392 LilTEpX.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe"C:\Users\Admin\AppData\Local\Temp\300925b3c2c78e204cef2778dad5e605bc46e04c567f56d9294a596acb2b3d83.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\LilTEpX.exe"C:\Users\Admin\AppData\Local\Temp\LilTEpX.exe" 8 LAN2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵PID:1880
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:3600
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵PID:5648
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵PID:5744
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵PID:5668
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵PID:5756
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2452
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:3888
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:688
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2848
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2104
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2576
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2416
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1160
-
-
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:3128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Modifies data under HKEY_USERS
PID:5124
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:5604