Analysis
-
max time kernel
155s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 11:00
Static task
static1
Behavioral task
behavioral1
Sample
be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe
Resource
win10v2004-20220812-en
General
-
Target
be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe
-
Size
885KB
-
MD5
622bc38dee08e70e91e2be32a58b6d1f
-
SHA1
7cfec4859fa7ca178095983b3f174f842a44b0c2
-
SHA256
be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a
-
SHA512
176b6ef6eb7ca308df5418643c9054caa41de726546834aea0e964adbe011a127a3eb440becc32a7d7ff922e48242c73c5abeac0688feec123478597a542692d
-
SSDEEP
12288:BdJPiMwyM02Jl5YqWYgeWYg955/155/0QebUlAAszsK6Qo1Rn6X:BPiMtklagQKUKRzsK6QmN6
Malware Config
Extracted
C:\ProgramData\RyukReadMe.txt
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Disables Task Manager via registry modification
-
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe attrib.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe cmd.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1784 icacls.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\G: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\O: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\Z: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\U: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\V: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\X: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\J: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\L: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\M: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\B: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\T: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\Y: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\W: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\E: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\H: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\N: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\Q: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\S: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\I: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\K: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\A: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\P: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened (read-only) \??\R: be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\VERSION.txt.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_joined.gif.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099150.JPG.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0211981.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY01491_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaBrightItalic.ttf.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-sampler.jar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-Regular.otf be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152716.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0386267.JPG.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00808_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Civic.xml.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\localedata.jar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\MST7.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Lisbon.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01629_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_fr.jar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\plugin.xml.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-ui.xml.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\vlc.mo.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\dummy.luac.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD19988_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\startNetworkServer.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-8.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-multitabs_ja.jar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\LEVEL.INF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382948.JPG.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01954_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Cancun.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00021_.GIF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02074U.BMP.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00423_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\feature.xml.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\Vdk10.lng.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198712.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-services.xml.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Macau.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Fakaofo.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Salta.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Auckland.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\org-openide-modules.jar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\PST8PDT.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd.otf.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\THMBNAIL.PNG.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00235_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00268_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_ko.properties.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Whitehorse.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.http.registry_1.1.300.v20130402-1529.jar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-compat_zh_CN.jar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Gibraltar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1258.TXT be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0384895.JPG.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-views_ja.jar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host_ja.jar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04385_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00255_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01293_.GIF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.components.ui_5.5.0.165303.jar.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh.htm.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Chatham.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00687_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01772_.WMF.[[email protected]].RYK be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1868 schtasks.exe 1648 schtasks.exe 912 schtasks.exe 1768 schtasks.exe -
Kills process with taskkill 2 IoCs
pid Process 1680 taskkill.exe 1776 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1776 taskkill.exe Token: SeDebugPrivilege 1680 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1980 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 28 PID 1516 wrote to memory of 1980 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 28 PID 1516 wrote to memory of 1980 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 28 PID 1980 wrote to memory of 1868 1980 cmd.exe 29 PID 1980 wrote to memory of 1868 1980 cmd.exe 29 PID 1980 wrote to memory of 1868 1980 cmd.exe 29 PID 1516 wrote to memory of 1632 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 30 PID 1516 wrote to memory of 1632 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 30 PID 1516 wrote to memory of 1632 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 30 PID 1516 wrote to memory of 1500 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 31 PID 1516 wrote to memory of 1500 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 31 PID 1516 wrote to memory of 1500 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 31 PID 1516 wrote to memory of 1100 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 32 PID 1516 wrote to memory of 1100 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 32 PID 1516 wrote to memory of 1100 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 32 PID 1100 wrote to memory of 1648 1100 cmd.exe 33 PID 1100 wrote to memory of 1648 1100 cmd.exe 33 PID 1100 wrote to memory of 1648 1100 cmd.exe 33 PID 1516 wrote to memory of 960 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 34 PID 1516 wrote to memory of 960 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 34 PID 1516 wrote to memory of 960 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 34 PID 960 wrote to memory of 536 960 cmd.exe 35 PID 960 wrote to memory of 536 960 cmd.exe 35 PID 960 wrote to memory of 536 960 cmd.exe 35 PID 1516 wrote to memory of 560 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 36 PID 1516 wrote to memory of 560 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 36 PID 1516 wrote to memory of 560 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 36 PID 560 wrote to memory of 912 560 cmd.exe 37 PID 560 wrote to memory of 912 560 cmd.exe 37 PID 560 wrote to memory of 912 560 cmd.exe 37 PID 1516 wrote to memory of 1912 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 38 PID 1516 wrote to memory of 1912 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 38 PID 1516 wrote to memory of 1912 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 38 PID 1912 wrote to memory of 1768 1912 cmd.exe 39 PID 1912 wrote to memory of 1768 1912 cmd.exe 39 PID 1912 wrote to memory of 1768 1912 cmd.exe 39 PID 1516 wrote to memory of 1816 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 40 PID 1516 wrote to memory of 1816 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 40 PID 1516 wrote to memory of 1816 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 40 PID 1816 wrote to memory of 1800 1816 cmd.exe 41 PID 1816 wrote to memory of 1800 1816 cmd.exe 41 PID 1816 wrote to memory of 1800 1816 cmd.exe 41 PID 1516 wrote to memory of 1156 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 42 PID 1516 wrote to memory of 1156 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 42 PID 1516 wrote to memory of 1156 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 42 PID 1156 wrote to memory of 1448 1156 cmd.exe 43 PID 1156 wrote to memory of 1448 1156 cmd.exe 43 PID 1156 wrote to memory of 1448 1156 cmd.exe 43 PID 1516 wrote to memory of 1088 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 44 PID 1516 wrote to memory of 1088 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 44 PID 1516 wrote to memory of 1088 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 44 PID 1088 wrote to memory of 800 1088 cmd.exe 45 PID 1088 wrote to memory of 800 1088 cmd.exe 45 PID 1088 wrote to memory of 800 1088 cmd.exe 45 PID 1516 wrote to memory of 1508 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 46 PID 1516 wrote to memory of 1508 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 46 PID 1516 wrote to memory of 1508 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 46 PID 1508 wrote to memory of 1712 1508 cmd.exe 48 PID 1508 wrote to memory of 1712 1508 cmd.exe 48 PID 1508 wrote to memory of 1712 1508 cmd.exe 48 PID 1516 wrote to memory of 1748 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 50 PID 1516 wrote to memory of 1748 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 50 PID 1516 wrote to memory of 1748 1516 be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe 50 PID 1748 wrote to memory of 1732 1748 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 536 attrib.exe 1800 attrib.exe 1448 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe"C:\Users\Admin\AppData\Local\Temp\be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN RYUK /TR C:\ProgramData\ryuk.exe /RU SYSTEM /RL HIGHEST /F2⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN RYUK /TR C:\ProgramData\ryuk.exe /RU SYSTEM /RL HIGHEST /F3⤵
- Creates scheduled task(s)
PID:1868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c copy C:\ProgramData\ryuk.exe "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe"2⤵
- Drops startup file
PID:1632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c copy C:\ProgramData\ryuk.exe "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe"2⤵PID:1500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN RYUK /TR C:\ProgramData\ryuk.exe /F2⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN RYUK /TR C:\ProgramData\ryuk.exe /F3⤵
- Creates scheduled task(s)
PID:1648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ryuk.exe"3⤵
- Drops startup file
- Views/modifies file attributes
PID:536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN ryk /TR "C:\Users\Admin\AppData\Local\Temp\be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe" /RU SYSTEM /RL HIGHEST /F2⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN ryk /TR "C:\Users\Admin\AppData\Local\Temp\be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe" /RU SYSTEM /RL HIGHEST /F3⤵
- Creates scheduled task(s)
PID:912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN RyuK /TR "C:\Users\Admin\AppData\Local\Temp\be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe" /F2⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /TN RyuK /TR "C:\Users\Admin\AppData\Local\Temp\be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a.exe" /F3⤵
- Creates scheduled task(s)
PID:1768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s ryuk.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\attrib.exeattrib +h +s ryuk.exe3⤵
- Views/modifies file attributes
PID:1800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s C:\ProgramData\ryuk.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\system32\attrib.exeattrib +h +s C:\ProgramData\ryuk.exe3⤵
- Views/modifies file attributes
PID:1448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q2⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\cmd.execmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q3⤵PID:800
-
C:\Windows\system32\icacls.exeicacls * /grant Everyone:(OI)(CI)F /T /C /Q4⤵
- Modifies file permissions
PID:1784
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd.exe /c taskkill /t /f /im sql* && taskkill /f /t /im veeam* && taskkill /F /T /IM MSExchange* && taskkill /F /T /IM Microsoft.Exchange* && taskkill /F /T /IM pvx* && taskkill /F /T /IM dbsrv* && exit2⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\cmd.execmd.exe /c taskkill /t /f /im sql*3⤵PID:1712
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im sql*4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im veeam*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f3⤵PID:1732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy hrmlog1 C:\ProgramData\hrmlog12⤵PID:596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy hrmlog2 C:\ProgramData\hrmlog22⤵PID:1760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy RYUKID C:\ProgramData\RYUKID2⤵PID:1504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy C:\ProgramData\hrmlog1 %userprofile%\Desktop\hrmlog12⤵PID:316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Copy "C:\ProgramData\RyukReadMe.txt " "%userprofile%\Desktop\RyukReadMe.txt "2⤵PID:832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵PID:1588
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵PID:616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f2⤵PID:1868
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f3⤵PID:1844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F2⤵PID:1632
-
C:\Windows\system32\reg.exereg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F3⤵PID:1500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F2⤵PID:1976
-
C:\Windows\system32\reg.exereg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F3⤵PID:1648
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD521a792fdd72dd7ddf309bf7e3819ac8b
SHA154a61afa0a6bfd7e87588d1da5978dae8f7be290
SHA256a62ba8e3eb83edbefc6a8051265a303b7a33e6b853616218c84a1ffa08441ab0
SHA5126ff050424079b5ed78eb4771f7efa34665f9b81bc9c8c498bd5437dc95c84b0ce1f997566bf686fffd0a3b4ab9f83af0cd840abcd5d4b8384d17da1edac99f6a
-
Filesize
1KB
MD5fdb92b73b4370f248e57b5292cb4b507
SHA15d86a3818e4c38d4821372900f21f8ec62d97efc
SHA25640f33de8d0fd8293c3d03b3b2a043c7e4e96393510e686b90acebf485bbf0477
SHA51276b35870a8c7a29a0ce36e548531dc6b09abb51b52781835c87fb7e6c276b84948137aa9f001b717ca0b9ffb0b27f47bae5fbb1be483aa74dbd2542409c387a9
-
Filesize
2KB
MD5566e76c377c6cbde155b8dbc2d4c0532
SHA1e616a181764f0dec13cf7d1cc37f0e35bd5adbec
SHA256d39a3de6f634ab642dd770313096a6c2de4cbc9b17b9d43220205463bac29fa2
SHA51263c0b14bb3791a0adfc9050a9f4b3ce2227a8511f12bd4043dad79b3887655da61ac42e4a4a65e1d5f139a794dd8bb31054697e435aee377887415a3148397ed
-
Filesize
2KB
MD5566e76c377c6cbde155b8dbc2d4c0532
SHA1e616a181764f0dec13cf7d1cc37f0e35bd5adbec
SHA256d39a3de6f634ab642dd770313096a6c2de4cbc9b17b9d43220205463bac29fa2
SHA51263c0b14bb3791a0adfc9050a9f4b3ce2227a8511f12bd4043dad79b3887655da61ac42e4a4a65e1d5f139a794dd8bb31054697e435aee377887415a3148397ed
-
Filesize
292B
MD5fb4f8969e391325a8b15c875e8a6f529
SHA18d2d1fee995be5da302f85c785d432cd290ebfe1
SHA2565d4ac4057332a801f449ecab45c0ca7e6101891813106a29326f76b091b3e168
SHA51257653dbf4a124c02d20ca981a2283b4f63d01ecc8c35048771a8275025cbaacd70000b5c7abec5d23802dfef92abb6c3aa203345c59f787b5034fe0fc0aea48a
-
Filesize
885KB
MD5622bc38dee08e70e91e2be32a58b6d1f
SHA17cfec4859fa7ca178095983b3f174f842a44b0c2
SHA256be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a
SHA512176b6ef6eb7ca308df5418643c9054caa41de726546834aea0e964adbe011a127a3eb440becc32a7d7ff922e48242c73c5abeac0688feec123478597a542692d
-
Filesize
8B
MD521a792fdd72dd7ddf309bf7e3819ac8b
SHA154a61afa0a6bfd7e87588d1da5978dae8f7be290
SHA256a62ba8e3eb83edbefc6a8051265a303b7a33e6b853616218c84a1ffa08441ab0
SHA5126ff050424079b5ed78eb4771f7efa34665f9b81bc9c8c498bd5437dc95c84b0ce1f997566bf686fffd0a3b4ab9f83af0cd840abcd5d4b8384d17da1edac99f6a
-
Filesize
2KB
MD5566e76c377c6cbde155b8dbc2d4c0532
SHA1e616a181764f0dec13cf7d1cc37f0e35bd5adbec
SHA256d39a3de6f634ab642dd770313096a6c2de4cbc9b17b9d43220205463bac29fa2
SHA51263c0b14bb3791a0adfc9050a9f4b3ce2227a8511f12bd4043dad79b3887655da61ac42e4a4a65e1d5f139a794dd8bb31054697e435aee377887415a3148397ed
-
Filesize
292B
MD5fb4f8969e391325a8b15c875e8a6f529
SHA18d2d1fee995be5da302f85c785d432cd290ebfe1
SHA2565d4ac4057332a801f449ecab45c0ca7e6101891813106a29326f76b091b3e168
SHA51257653dbf4a124c02d20ca981a2283b4f63d01ecc8c35048771a8275025cbaacd70000b5c7abec5d23802dfef92abb6c3aa203345c59f787b5034fe0fc0aea48a
-
Filesize
885KB
MD5622bc38dee08e70e91e2be32a58b6d1f
SHA17cfec4859fa7ca178095983b3f174f842a44b0c2
SHA256be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a
SHA512176b6ef6eb7ca308df5418643c9054caa41de726546834aea0e964adbe011a127a3eb440becc32a7d7ff922e48242c73c5abeac0688feec123478597a542692d