Analysis

  • max time kernel
    123s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-03-2022 04:29

General

  • Target

    a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe

  • Size

    171KB

  • MD5

    567407d941d99abeff20a1b836570d30

  • SHA1

    e8866fda01f91c6d4bf8c51cf4cbc7f103e87b0b

  • SHA256

    a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510

  • SHA512

    514cc28f8da0e8bf054bf0a0963c4253a16df1d5cb8e87dd09294ab97d8e1b5b5fc18c54920a3829d40b0bdda5837567a73b39b4d1839ab919d672ceaf32989b

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorithm. Backups were either encrypted or deleted or backup disks were formatted. Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. We exclusively have decryption software for your situation No decryption software is available in the public. DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT RENAME OR MOVE the encrypted and readme files. DO NOT DELETE readme files. This may lead to the impossibility of recovery of the certain files. To get info (decrypt your files) contact us at LisaHines@tutanota.com or LisaHines@tutanota.com BTC wallet: 15FC73BdkpDMUWmxo7e7gtLRtM8gQgXyb4 Ryuk No system is safe
Emails

LisaHines@tutanota.com

Wallets

15FC73BdkpDMUWmxo7e7gtLRtM8gQgXyb4

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 18 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Interacts with shadow copies 2 TTPs 14 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1312 -s 348
      2⤵
      • Program crash
      PID:1224
  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1228 -s 248
      2⤵
      • Program crash
      PID:528
  • C:\Users\Admin\AppData\Local\Temp\a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe
    "C:\Users\Admin\AppData\Local\Temp\a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:612
      • C:\Windows\system32\reg.exe
        REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe" /f
        3⤵
        • Adds Run key to start application
        PID:684
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\users\Public\window.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:70632
      • C:\Windows\system32\vssadmin.exe
        vssadmin Delete Shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:70612
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=c: /on=c: /maxsize=401MB
        3⤵
        • Interacts with shadow copies
        PID:1752
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded
        3⤵
        • Interacts with shadow copies
        PID:1064
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=d: /on=d: /maxsize=401MB
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1548
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1740
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1716
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1640
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1104
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1288
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:892
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1932
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1600
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:852
      • C:\Windows\system32\vssadmin.exe
        vssadmin Delete Shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:816
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1080
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:36108

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    File Deletion

    2
    T1107

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Impact

    Inhibit System Recovery

    2
    T1490

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\users\Public\window.bat
      MD5

      d2aba3e1af80edd77e206cd43cfd3129

      SHA1

      3116da65d097708fad63a3b73d1c39bffa94cb01

      SHA256

      8940135a58d28338ce4ea9b9933e6780507c56ab37a2f2e3a1a98c6564548a12

      SHA512

      0059bd4cc02c52a219a0a2e1836bf04c11e2693446648dd4d92a2f38ed060ecd6c0f835e542ff8cfef8903873c01b8de2b38ed6ed2131a131bdd17887c11d0ec

    • \??\c:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\brndlog.bak
      MD5

      eeaaa298e7b59a78cd106fd245399811

      SHA1

      ae44044dc3e12053af5a655db33166e4b28d23e0

      SHA256

      052f2c360749275747b94ff1547f24ac03647f239b87bb32139306077a2d339c

      SHA512

      fe16e3c1065d6324664d44c3aacd9c6a6c6cdebc4ad7997d372e11591edb3e6912fc43ee9de5bd0b662f2b9600ac27fb0a89db1ef5fab331bfd00aa59793f855

    • \??\c:\Users\Admin\Documents\BackupGroup.vdx
      MD5

      55e7a50d4c49de6dae51903f2dbc88b7

      SHA1

      c413273c32a2de7043cef453b5d8874113c3c07d

      SHA256

      fc3abdf69ff62ee0907424771f96738262149ec9215c05a7a012513c1f6835e9

      SHA512

      a3ff97f4be28dda6504ba4d1178010ac35665a1fc08e037f9af9c78bf4ec16217d786940cac6a1e765c0a3c550a8196670125384731547543d0761517fbf67c3

    • \??\c:\Users\Admin\Downloads\BackupGrant.wdp
      MD5

      cb085c4e2d798d24d36346588b685dc4

      SHA1

      5e8677d2592747088b7804305a060aa0c0d6f0c3

      SHA256

      5b1fa992ff7951e286bb17cb55d91ab12ad7732c92542d73e45d342bcc4c640b

      SHA512

      fb0a3669c829660170961a31a77b12523a25c0c2f2f47c0b037c867f0290e92f7a4100d4bcb58cf39fd39bae3f943b0d2f6e0e126d284b7d5002b30b491f3060

    • \??\c:\Users\Admin\Downloads\BackupMeasure.rtf
      MD5

      4713d40baf2738ca0b4ea64c8bcc51aa

      SHA1

      6780f6db644d6b2e47f39c1f549e13bcbf98d6dc

      SHA256

      9d30bc240f0296f1d9a46a28232be4bf948fda1765ca1247f35ba98c4eb379f0

      SHA512

      84f8a6ce353ab82d91d5bbb45045f1f9f612a4f6fca2dbef71b96db734165356583c2e482ba83a19df3ed159ba0ce106edc21ca140f0612557ffe8df8ec1d173

    • memory/1228-55-0x000000013F280000-0x000000013F60E000-memory.dmp
      Filesize

      3.6MB

    • memory/1648-54-0x000007FEFB791000-0x000007FEFB793000-memory.dmp
      Filesize

      8KB