Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
06-03-2022 02:26
Static task
static1
Behavioral task
behavioral1
Sample
af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe
Resource
win10v2004-en-20220112
General
-
Target
af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe
-
Size
120KB
-
MD5
d06b3960bbb5b12b3b5827296d6551db
-
SHA1
58c0a54b4c6dd1f616631ffd973a54ee77b50c55
-
SHA256
af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b
-
SHA512
e40bc6aab4fa50543f649879aa0ecd200a60e305057cf32671067377d0c027b869bcbbf28e02e408d9ec77f6ed058f6a70cf68849eda8cef67281d3717ee75f0
Malware Config
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
apmasampbubb1977@protonmail.com
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Modifies file permissions 1 TTPs 2 IoCs
Processes:
icacls.exeicacls.exepid process 804 icacls.exe 3548 icacls.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe -
Drops file in Program Files directory 64 IoCs
Processes:
af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.w3c.dom.events_3.0.0.draft20060413_v201105210656.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp-ul-phn.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\lpc.win32.bundle af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\AccessBridgeCallbacks.h af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-swing-tabcontrol.xml af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_LinkDrop32x32.gif af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\RyukReadMe.html af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\RyukReadMe.html af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-pl.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Trial-pl.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\RyukReadMe.html af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core.xml af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-ul-oob.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordR_Trial-ppd.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-moreimages@4x.png af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\iexplore.exe.mui af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-keyring.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-filesystems.xml af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipschs.xml af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyrun.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.update\RyukReadMe.html af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-actions.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-jvmstat.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WWLIB.DLL af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqloledb.rll.mui af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_KMS_Client-ul.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-ul-oob.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub2019_eula.txt af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\notice.txt af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface.nl_zh_4.4.0.v20140623020002.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-profiler_ja.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\Office16\SLERROR.XML af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Slipstream.xml af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-ppd.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTrial-ppd.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_OEM_Perp-pl.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Resources.pri af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\feature.properties af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro.ja_5.5.0.165303.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL044.XML af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\catalog.json af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423496937509.profile.gz af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-pl.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Retail-pl.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_OEM_Perp-ppd.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-black_scale-100.png af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ui_5.5.0.165303.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\psfontj2d.properties af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-pl.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Grace-ppd.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-netbeans-modules-queries.xml af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-api.xml af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription2-ul-oob.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-pl.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\cldrdata.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jvm.hprof.txt af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Arial Black-Arial.xml af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.swt.nl_ja_4.4.0.v20140623020002.jar af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-ui.xml af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Retail-ppd.xrm-ms af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\LTSHYPH_EN.LEX af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exedescription pid process target process PID 3700 wrote to memory of 804 3700 af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe icacls.exe PID 3700 wrote to memory of 804 3700 af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe icacls.exe PID 3700 wrote to memory of 804 3700 af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe icacls.exe PID 3700 wrote to memory of 3548 3700 af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe icacls.exe PID 3700 wrote to memory of 3548 3700 af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe icacls.exe PID 3700 wrote to memory of 3548 3700 af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe"C:\Users\Admin\AppData\Local\Temp\af5169631789347e6884a5402a945d7eac6d07784a79caf858ab59c8e2201e8b.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\RyukReadMe.htmlMD5
13db87b5d27c1d62b4a2c9911d0025ce
SHA1cdb34398e63235fd03c4c4eb85bca8bcd1daa3a3
SHA2568f00dc7bd38819a39c6ee168ef037d958d8aa49e16ee4aa96be55f112bb35000
SHA5129d01c40a1a95171a101e457bfc8fa038a94ac1d208516380720e9f8bd9648aacc4372c5961cdec511eedd0fa053c55a936af5607a48576678cd318910146c58d
-
C:\$Recycle.Bin\S-1-5-21-790714498-1549421491-1643397139-1000\RyukReadMe.htmlMD5
13db87b5d27c1d62b4a2c9911d0025ce
SHA1cdb34398e63235fd03c4c4eb85bca8bcd1daa3a3
SHA2568f00dc7bd38819a39c6ee168ef037d958d8aa49e16ee4aa96be55f112bb35000
SHA5129d01c40a1a95171a101e457bfc8fa038a94ac1d208516380720e9f8bd9648aacc4372c5961cdec511eedd0fa053c55a936af5607a48576678cd318910146c58d
-
C:\DumpStack.log.tmp.RYKMD5
a5b5cade89ec7c6b698276cd38c08cfe
SHA169bd539c49a6a90e22beeea239fd5c9deba9671e
SHA25691c0ace9b91acc87c536043fac7f056b10d9116407c4aaf0c52f4ead599d0407
SHA512ea61d01dca6eb4c7c5c5687328286abeaeeedec80162ce592c9031422899f09bb1997cad03409bdea9f4762a8d30b933e540c9897b40ce21ef53950c3810e851
-
C:\PerfLogs\RyukReadMe.htmlMD5
13db87b5d27c1d62b4a2c9911d0025ce
SHA1cdb34398e63235fd03c4c4eb85bca8bcd1daa3a3
SHA2568f00dc7bd38819a39c6ee168ef037d958d8aa49e16ee4aa96be55f112bb35000
SHA5129d01c40a1a95171a101e457bfc8fa038a94ac1d208516380720e9f8bd9648aacc4372c5961cdec511eedd0fa053c55a936af5607a48576678cd318910146c58d
-
C:\RyukReadMe.htmlMD5
13db87b5d27c1d62b4a2c9911d0025ce
SHA1cdb34398e63235fd03c4c4eb85bca8bcd1daa3a3
SHA2568f00dc7bd38819a39c6ee168ef037d958d8aa49e16ee4aa96be55f112bb35000
SHA5129d01c40a1a95171a101e457bfc8fa038a94ac1d208516380720e9f8bd9648aacc4372c5961cdec511eedd0fa053c55a936af5607a48576678cd318910146c58d
-
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.htmlMD5
13db87b5d27c1d62b4a2c9911d0025ce
SHA1cdb34398e63235fd03c4c4eb85bca8bcd1daa3a3
SHA2568f00dc7bd38819a39c6ee168ef037d958d8aa49e16ee4aa96be55f112bb35000
SHA5129d01c40a1a95171a101e457bfc8fa038a94ac1d208516380720e9f8bd9648aacc4372c5961cdec511eedd0fa053c55a936af5607a48576678cd318910146c58d
-
C:\Users\Public\RyukReadMe.htmlMD5
13db87b5d27c1d62b4a2c9911d0025ce
SHA1cdb34398e63235fd03c4c4eb85bca8bcd1daa3a3
SHA2568f00dc7bd38819a39c6ee168ef037d958d8aa49e16ee4aa96be55f112bb35000
SHA5129d01c40a1a95171a101e457bfc8fa038a94ac1d208516380720e9f8bd9648aacc4372c5961cdec511eedd0fa053c55a936af5607a48576678cd318910146c58d
-
C:\Users\RyukReadMe.htmlMD5
13db87b5d27c1d62b4a2c9911d0025ce
SHA1cdb34398e63235fd03c4c4eb85bca8bcd1daa3a3
SHA2568f00dc7bd38819a39c6ee168ef037d958d8aa49e16ee4aa96be55f112bb35000
SHA5129d01c40a1a95171a101e457bfc8fa038a94ac1d208516380720e9f8bd9648aacc4372c5961cdec511eedd0fa053c55a936af5607a48576678cd318910146c58d
-
C:\odt\RyukReadMe.htmlMD5
13db87b5d27c1d62b4a2c9911d0025ce
SHA1cdb34398e63235fd03c4c4eb85bca8bcd1daa3a3
SHA2568f00dc7bd38819a39c6ee168ef037d958d8aa49e16ee4aa96be55f112bb35000
SHA5129d01c40a1a95171a101e457bfc8fa038a94ac1d208516380720e9f8bd9648aacc4372c5961cdec511eedd0fa053c55a936af5607a48576678cd318910146c58d
-
C:\odt\config.xml.RYKMD5
0f2949112168d6675b817d4d21167d35
SHA1a36521d873be31966010347dfb0cfba8d39fd546
SHA256ab4e4b33eb0d655c08334d4530ddd95c265efe11f8eb5187890c0f2d67b5cec0
SHA51238053dcea093be3d7a0c179543b268a36894c0ab567635df9c7117fa521845f475239fe3bf3db81c993608cd807223faf27a05329564a8a8702a265033cde91f