Analysis
-
max time kernel
4294211s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
05/03/2022, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe
Resource
win10v2004-en-20220112
General
-
Target
88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe
-
Size
575KB
-
MD5
6cad2f7dc809b9353a31753a438aef4e
-
SHA1
459d816bb020f5da8257076a36d0ffd1f1f02d76
-
SHA256
88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335
-
SHA512
a67367990452bf21b7c0d0682c598422c78a5ed455a5d5e684d8fabb43366b0e9f9cd579a5f18123f6b1f97945f789904929838d1d893b70f450bfeafb243bb8
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Modifies file permissions 1 TTPs 2 IoCs
pid Process 788 icacls.exe 1592 icacls.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\af.txt 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe File opened for modification C:\Program Files\RyukReadMe.html 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe File opened for modification C:\Program Files\7-Zip\History.txt 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe File opened for modification C:\Program Files\7-Zip\descript.ion 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe File opened for modification C:\Program Files\7-Zip\RyukReadMe.html 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 616 wrote to memory of 788 616 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 29 PID 616 wrote to memory of 788 616 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 29 PID 616 wrote to memory of 788 616 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 29 PID 616 wrote to memory of 788 616 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 29 PID 616 wrote to memory of 1592 616 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 30 PID 616 wrote to memory of 1592 616 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 30 PID 616 wrote to memory of 1592 616 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 30 PID 616 wrote to memory of 1592 616 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe"C:\Users\Admin\AppData\Local\Temp\88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:788
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1592
-