Analysis
-
max time kernel
4294181s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
01-03-2022 13:27
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-en-20220112
General
-
Target
tmp.exe
-
Size
5.6MB
-
MD5
8553fce61d3e5901ac350a295ea9ab43
-
SHA1
a0a153fe479ced746588ad6d8507feae48a8faf7
-
SHA256
2b5bda4a5b69baf73b091ff56f4e093af1ed26b4b6c8e8c091056d8bbf655877
-
SHA512
e945653a21e6b8c9c47061634c5f99e93ad9fa0d532a2091af01e345f82ebf3bde6932b56bb453fac6e7489a4e94d0480fe1687270ca6a8aa51e945615c37ad8
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\pss.txt
ryuk
http
http!23
http1
http12
http123
http1234
httpd
httpd!@#$
httpd112233
httpd123
httpd1234
httpdroot
httpds
https
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
pid Process 1760 ctfmon.exe -
Loads dropped DLL 3 IoCs
pid Process 1144 tmp.exe 1760 ctfmon.exe 1760 ctfmon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1760 1144 tmp.exe 27 PID 1144 wrote to memory of 1760 1144 tmp.exe 27 PID 1144 wrote to memory of 1760 1144 tmp.exe 27 PID 1144 wrote to memory of 1760 1144 tmp.exe 27 PID 1144 wrote to memory of 1760 1144 tmp.exe 27 PID 1144 wrote to memory of 1760 1144 tmp.exe 27 PID 1144 wrote to memory of 1760 1144 tmp.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\ctfmon.exe"C:\Users\Admin\AppData\Local\Temp\ctfmon.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760
-