Analysis
-
max time kernel
127s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
24-02-2022 04:21
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-en-20220113
General
-
Target
tmp.exe
-
Size
5.6MB
-
MD5
8553fce61d3e5901ac350a295ea9ab43
-
SHA1
a0a153fe479ced746588ad6d8507feae48a8faf7
-
SHA256
2b5bda4a5b69baf73b091ff56f4e093af1ed26b4b6c8e8c091056d8bbf655877
-
SHA512
e945653a21e6b8c9c47061634c5f99e93ad9fa0d532a2091af01e345f82ebf3bde6932b56bb453fac6e7489a4e94d0480fe1687270ca6a8aa51e945615c37ad8
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\pss.txt
ryuk
http
http!23
http1
http12
http123
http1234
httpd
httpd!@#$
httpd112233
httpd123
httpd1234
httpdroot
httpds
https
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 3588 ctfmon.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation tmp.exe -
Loads dropped DLL 3 IoCs
pid Process 3588 ctfmon.exe 3588 ctfmon.exe 3588 ctfmon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4784 wrote to memory of 3588 4784 tmp.exe 82 PID 4784 wrote to memory of 3588 4784 tmp.exe 82 PID 4784 wrote to memory of 3588 4784 tmp.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\ctfmon.exe"C:\Users\Admin\AppData\Local\Temp\ctfmon.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3588
-