Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2023, 17:11

General

  • Target

    2023-08-22_53ae3998779825da250ac4e5c81773dc_ryuk_JC.exe

  • Size

    3.4MB

  • MD5

    53ae3998779825da250ac4e5c81773dc

  • SHA1

    bcbe29e72f9b57451e33d441966d2d409bfd8ff2

  • SHA256

    35325555ffe7e72a77b0eb9141e1f257c653aba4ef587d94c5b5c5053b12829f

  • SHA512

    686b8b135f56fbc4bc43bd4bc92ff1fd3827b25aefce5404e695c0499071aa7767028ec7e5d02f59804ae0a1f09476915a6ff128880e9fea6652883139db69fd

  • SSDEEP

    98304:9E2RpMMHMMMvMMZMMMlmMMMiMMMYJMMHMMM6MMZMMMqNMMzMMMUMMVMMMYJMMzM5:9n/

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-22_53ae3998779825da250ac4e5c81773dc_ryuk_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-22_53ae3998779825da250ac4e5c81773dc_ryuk_JC.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:5108

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-528036852-1341495193-1175965888-1000\desktop.ini.exe

          Filesize

          3.4MB

          MD5

          9813117b9e04fc49bca5122799f7fd72

          SHA1

          0672041c8288cc7af1fe806e3fd57c8eb7ef8e38

          SHA256

          088735e7c12ecadff68e56bc521f70cb05dabb139e1e30cfac270b26d702f4d0

          SHA512

          cd35a5f548eb9a175f0042414b2ab3a3b405075c4bac1a84f9f6641ce4264c4b4cf9288ffb9bbbc447082b0c54eb180020a9c5a682185d9d23c3dbb23f2e97d6

        • C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe

          Filesize

          4.2MB

          MD5

          760d3d9871c512d91a2f299dd88d27be

          SHA1

          e556ab911b6833326726c932138b67cf8533fc2e

          SHA256

          862ec46fd006aed516282a8769ddf6f60d2c4ef98383f6b346c83f9241694dd5

          SHA512

          5294198a4b67525bfffd163495f4e4b9a629adf490a5637aa3ed86ec27e743e1e48c0f7a5c12421b7b8f20caf335fc3408f40484f315bca9361b8f6eddc4cabb

        • F:\AUTORUN.INF

          Filesize

          145B

          MD5

          ca13857b2fd3895a39f09d9dde3cca97

          SHA1

          8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

          SHA256

          cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

          SHA512

          55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

        • memory/5108-0-0x0000000000400000-0x000000000047B000-memory.dmp

          Filesize

          492KB

        • memory/5108-1-0x0000000002410000-0x0000000002411000-memory.dmp

          Filesize

          4KB

        • memory/5108-286-0x0000000000400000-0x000000000047B000-memory.dmp

          Filesize

          492KB

        • memory/5108-311-0x0000000002410000-0x0000000002411000-memory.dmp

          Filesize

          4KB