Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
05-03-2022 21:08
Static task
static1
Behavioral task
behavioral1
Sample
88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe
Resource
win10v2004-en-20220112
General
-
Target
88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe
-
Size
575KB
-
MD5
6cad2f7dc809b9353a31753a438aef4e
-
SHA1
459d816bb020f5da8257076a36d0ffd1f1f02d76
-
SHA256
88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335
-
SHA512
a67367990452bf21b7c0d0682c598422c78a5ed455a5d5e684d8fabb43366b0e9f9cd579a5f18123f6b1f97945f789904929838d1d893b70f450bfeafb243bb8
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1152 icacls.exe 1996 icacls.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1800 2720 WerFault.exe 52 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2720 wrote to memory of 1152 2720 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 63 PID 2720 wrote to memory of 1152 2720 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 63 PID 2720 wrote to memory of 1152 2720 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 63 PID 2720 wrote to memory of 1996 2720 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 64 PID 2720 wrote to memory of 1996 2720 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 64 PID 2720 wrote to memory of 1996 2720 88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe 64
Processes
-
C:\Users\Admin\AppData\Local\Temp\88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe"C:\Users\Admin\AppData\Local\Temp\88b1b4966650de59cef20c340b28739c52dc9ead91d9959a338a8e531ad38335.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1152
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 11202⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2720 -ip 27201⤵PID:3392