Analysis

  • max time kernel
    160s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2023 19:05

General

  • Target

    NEAS.2023-09-05_036b5cf132e734762af8fbf07faf094a_ryuk_JC.exe

  • Size

    21.6MB

  • MD5

    036b5cf132e734762af8fbf07faf094a

  • SHA1

    d71e385c7a3e808acfcf63f71291ba74c435b306

  • SHA256

    e301f19720af26914bd818e738f68ce7d1fa7ccdcd1cbe97b867e2bbf7fbe97e

  • SHA512

    bd4f1113e9f161edc2aed4c9816779b367bdb68e637178e37a3d26d7e17991b8872020e232c21dbe83485d3f19c19312a5c8a598dd07941834fc91169db04723

  • SSDEEP

    98304:9E2RpMMHMMMvMMZMMMlmMMMiMMMYJMMHMMM6MMZMMMqNMMzMMMUMMVMMMYJMMzMW:9nwngnwnBR/

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Renames multiple (224) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_036b5cf132e734762af8fbf07faf094a_ryuk_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_036b5cf132e734762af8fbf07faf094a_ryuk_JC.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3125601242-331447593-1512828465-1000\desktop.ini.exe

    Filesize

    21.6MB

    MD5

    53e56505a047f95e4a306af08d0c63f8

    SHA1

    892be5e84cfd69d27dc69719931609476194367b

    SHA256

    59cbb41510417ada36fd6573d6ddb32213dbc0d1cd7657d300b60a18b3b173bd

    SHA512

    6dcdda6b804ee4b1b9be10419e5340a446183ea406e28b0ecfbd71ee5c62fcfb5613dfe8561c23ea1f055ada51dedb16113492053d29c6c874e15d7bce48d339

  • C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe

    Filesize

    22.4MB

    MD5

    1c94f83fb8d6432a4e8b02e63261b25a

    SHA1

    b14e366c6f632862cb2746373c3467d0b72031f2

    SHA256

    8216b3eee1390c62fbf2b0d33f7a3f6ae8739ac50a5365797aa05379399eb008

    SHA512

    7d37b4bf934d87b6c342c9a544c314fe3d40a2523afd5e1a78090191ca057cb20d78da62c4618fb25be771b2d0b624c99bf3efea4002027c66012a355cc29628

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • memory/4712-0-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/4712-1-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/4712-2-0x00000000022F0000-0x00000000022F1000-memory.dmp

    Filesize

    4KB

  • memory/4712-61-0x00000000022F0000-0x00000000022F1000-memory.dmp

    Filesize

    4KB