General
-
Target
00dd4a371156258e4fe3c421c044b0244500df971ae37b8ea6650fd45ad8c9de
-
Size
448KB
-
Sample
220302-ejrm5scgd9
-
MD5
bf7b854542cfa423dee3b7233c4a255e
-
SHA1
a9b09989972cc063b34c4afcd82ebe9203d61be2
-
SHA256
00dd4a371156258e4fe3c421c044b0244500df971ae37b8ea6650fd45ad8c9de
-
SHA512
147205767585c86b29435ca44a605d06208b7e126007fbc3d5a8c1a30896f03c0d832c07608895cd1e14b3966853306ebac1058f02c2e68efc8f89fad938cada
Static task
static1
Behavioral task
behavioral1
Sample
00dd4a371156258e4fe3c421c044b0244500df971ae37b8ea6650fd45ad8c9de.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
00dd4a371156258e4fe3c421c044b0244500df971ae37b8ea6650fd45ad8c9de.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Microsoft\RyukReadMe.html
ryuk
Targets
-
-
Target
00dd4a371156258e4fe3c421c044b0244500df971ae37b8ea6650fd45ad8c9de
-
Size
448KB
-
MD5
bf7b854542cfa423dee3b7233c4a255e
-
SHA1
a9b09989972cc063b34c4afcd82ebe9203d61be2
-
SHA256
00dd4a371156258e4fe3c421c044b0244500df971ae37b8ea6650fd45ad8c9de
-
SHA512
147205767585c86b29435ca44a605d06208b7e126007fbc3d5a8c1a30896f03c0d832c07608895cd1e14b3966853306ebac1058f02c2e68efc8f89fad938cada
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Suspicious use of SetThreadContext
-