Analysis
-
max time kernel
158s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 09:31
Static task
static1
Behavioral task
behavioral1
Sample
1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe
Resource
win10v2004-en-20220113
General
-
Target
1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe
-
Size
168KB
-
MD5
a66f22dfd411a7481b52511ea944209a
-
SHA1
e723b9d32b367c127d181e122ec53e0d528b4954
-
SHA256
1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50
-
SHA512
65089f73b85d7f14b9276dac0c5653f00c3e1d958ffccda2a980201ee5141055faadbc7795d7aef6848182904112feb0af6727697e17313f082c32a189f77dd8
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1608 wrote to memory of 2180 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 29 PID 1608 wrote to memory of 2180 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 29 PID 1608 wrote to memory of 2180 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 29 PID 1608 wrote to memory of 2180 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 29 PID 1608 wrote to memory of 2264 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 31 PID 1608 wrote to memory of 2264 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 31 PID 1608 wrote to memory of 2264 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 31 PID 1608 wrote to memory of 2264 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 31 PID 2264 wrote to memory of 2700 2264 net.exe 33 PID 2264 wrote to memory of 2700 2264 net.exe 33 PID 2264 wrote to memory of 2700 2264 net.exe 33 PID 2264 wrote to memory of 2700 2264 net.exe 33 PID 2180 wrote to memory of 2708 2180 net.exe 34 PID 2180 wrote to memory of 2708 2180 net.exe 34 PID 2180 wrote to memory of 2708 2180 net.exe 34 PID 2180 wrote to memory of 2708 2180 net.exe 34 PID 1608 wrote to memory of 8464 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 35 PID 1608 wrote to memory of 8464 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 35 PID 1608 wrote to memory of 8464 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 35 PID 1608 wrote to memory of 8464 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 35 PID 8464 wrote to memory of 8488 8464 net.exe 37 PID 8464 wrote to memory of 8488 8464 net.exe 37 PID 8464 wrote to memory of 8488 8464 net.exe 37 PID 8464 wrote to memory of 8488 8464 net.exe 37 PID 1608 wrote to memory of 8616 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 38 PID 1608 wrote to memory of 8616 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 38 PID 1608 wrote to memory of 8616 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 38 PID 1608 wrote to memory of 8616 1608 1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe 38 PID 8616 wrote to memory of 8640 8616 net.exe 40 PID 8616 wrote to memory of 8640 8616 net.exe 40 PID 8616 wrote to memory of 8640 8616 net.exe 40 PID 8616 wrote to memory of 8640 8616 net.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe"C:\Users\Admin\AppData\Local\Temp\1efee516f6e8c5004de0ac50e94330fd1e4ffbf11412130dc7ecf7833062dd50.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2708
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2700
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8488
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:8616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:8640
-
-