Analysis

  • max time kernel
    162s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 16:45

General

  • Target

    2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe

  • Size

    26.6MB

  • MD5

    5d52e0e5d2e1c2955011dd585f0848ae

  • SHA1

    7da00cb8fac2f21d495111c8754e7cd37f1540f3

  • SHA256

    64229251028e91c9b3a44e1a13f7fe2cdc036db7d3ef8b943dedb36d4549d3c0

  • SHA512

    e254e58aca8625d0cff2f829a49bdea1952c6010edec5a574bdd9cbfa72ecb525ed9fa66a34e0834000e051cf82ae6aa332d8405acb08e1f0eabcee435937887

  • SSDEEP

    98304:9E2RpMMHMMMvMMZMMMlmMMMiMMMYJMMHMMM6MMZMMMqNMMzMMMUMMVMMMYJMMzMr:9nwngnwnC

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2700

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-452311807-3713411997-1028535425-1000\desktop.ini.exe

          Filesize

          501KB

          MD5

          b7d24d5075bfb2fb52838c5fd90c737b

          SHA1

          a14876045ad43a78a9bc72a5141e09ea17c4eafa

          SHA256

          707b888c118db2c260d5d16159e23919eaf0a4d7a4166b26794b796ccdea717d

          SHA512

          e6d76f99e9a592418dd93a49e8e9af4aefdc9d9ba36d079cf9885ad02df923c29e37e90b952145f95db66b4e5e6b32e45d8e4a66f001c20e357ae7e801f85264

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

          Filesize

          1KB

          MD5

          15f5f0ea9e7135eee8d0a5ff377911c9

          SHA1

          54907ed3ee22eb9b68722e1fb61a497b30de9b67

          SHA256

          489cc83de30dc35599d4bc25bcb4d6b590860ca23ab4419a214fc11bcffa29b2

          SHA512

          88a3d002e9a5a6c555b2cd92185db16365c5a93243a2d92a014e2ccd249c606de36283272892288460f2a007976f6eb7092b642e5a438c68512668fd9dadefe2

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

          Filesize

          950B

          MD5

          11ac86bd8e60110e7ee15ab755d492f7

          SHA1

          538d0dfd3b4f760ad9afbc0f9a7564ccf87470b2

          SHA256

          1cd659c3978e9e2d12373205e144520c546099d6f18a85f465155934472c753a

          SHA512

          cb03b79ffee8ded5e196e75355b9b5d5e750fd19f8c766b2b59c2d409f5abfcaaf6bb60e6048bae5642161a46fb996e416c855d82766e7a5355ed4679d3d3ca6

        • C:\Windows\SysWOW64\HelpMe.exe

          Filesize

          1.2MB

          MD5

          3641c8b7ef5dface1ce914404353ef9e

          SHA1

          186b852d79188fe285a659b97d4ed0f29e8de065

          SHA256

          61fbba0f94116fa9a9df9bb290d2a0c8fb639118625780a8071f190f4b8eb5ac

          SHA512

          150968ca2bb4ce6237fdaa67a9c1ffe80bf44434189c960c3ecaa75f5ec14aad07fd12df402409862b26b17f52d297482e310b1c7c00dd970bcd5903a8346482

        • C:\Windows\SysWOW64\HelpMe.exe

          Filesize

          925KB

          MD5

          04e7d2ab22d89b01e39a75b2e07b9839

          SHA1

          2e517349c79fc6a80014a17554fd3e608e3761b0

          SHA256

          87fbdf4fd03bd61e47133a1b05fc10fc73d1f356cfa90fe6417dd2caefb59ec2

          SHA512

          c7e41a8b0cd6ca5b5fd49215657aa30c4cb8d3702139efd9465acd0b136c09faa5c0af9a8f35a815dac586f8d596437e879857b92f3f7358788667db79695fc7

        • C:\Windows\SysWOW64\HelpMe.exe

          Filesize

          64KB

          MD5

          c12c36058eb0c9a2ff4bdb5225cb0066

          SHA1

          74691427b3e332ba99751c377c792ab09c50b032

          SHA256

          845967cd05fa3658c710d6b7bcaad6e112ebb88ea3157cc28442d73bfdb2d75c

          SHA512

          c49e60a80a2ebfeb5ebee3713b70f48ddeb5ac6fa3d4741558174e0a79669b2e963e9bfaa42341dba135533d478c8c3dfa3c513bc8ee4c0b316dc58479106a80

        • F:\AUTORUN.INF

          Filesize

          145B

          MD5

          ca13857b2fd3895a39f09d9dde3cca97

          SHA1

          8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

          SHA256

          cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

          SHA512

          55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

        • F:\AutoRun.exe

          Filesize

          888KB

          MD5

          c7380abce22a69d66d75160a9234a30d

          SHA1

          acd5695b85b1f85d0e4b3c56b6c2368678e87610

          SHA256

          f78368b9311b40d5698089f0a882c66ed9980c574699ad267189b2d697baa7e2

          SHA512

          1500a8024e854f6fffe6aa167521b2f024e6e89d0f0197c17cc4f048492253753bb1b5ab17d0c16110323dbf51840887e2c0c9c96ea387328c29719eed90dbfc

        • \Windows\SysWOW64\HelpMe.exe

          Filesize

          2.1MB

          MD5

          6ad2d1426241253f4a5749128e188072

          SHA1

          31337cca15c458183790c6e2d1c0063ab04e13d0

          SHA256

          a0a1180e96890af3f04b17a0cac0e25e4e9afadf2ebe28d68772da9aba1171fa

          SHA512

          f113abda3ee040d8665e425d754dbc92a785e08f5de32ed710b8afc034e2ee0da32b59f544a2f4ccc5e3961e7daa0a89fceb303d2d37f59863d47e5e245ce260

        • \Windows\SysWOW64\HelpMe.exe

          Filesize

          641KB

          MD5

          2f7afbd96c5cf50240f50364f20365c8

          SHA1

          872f4561ef76f19b9fdc3e4d24d570e409fdd835

          SHA256

          522379b167253633c4ee72d1969bb6f7dfdbaebda43ce4cc7e708e5e541063d0

          SHA512

          c3a559848bbb5f7da178c775a31bf3f04df2247c2ecc38c6c4dfeb0e2c90c57ac0358ad2efddb2e7c33e0fe1ea07a93ed9e884c8cbd4546b6d6681c00f5869fc

        • memory/2700-11-0x0000000000400000-0x000000000047B000-memory.dmp

          Filesize

          492KB

        • memory/2700-13-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/2700-84-0x0000000000400000-0x000000000047B000-memory.dmp

          Filesize

          492KB

        • memory/2740-0-0x0000000000400000-0x000000000047B000-memory.dmp

          Filesize

          492KB

        • memory/2740-4-0x0000000001F30000-0x0000000001FAB000-memory.dmp

          Filesize

          492KB

        • memory/2740-81-0x0000000000400000-0x000000000047B000-memory.dmp

          Filesize

          492KB

        • memory/2740-82-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2740-83-0x0000000001F30000-0x0000000001FAB000-memory.dmp

          Filesize

          492KB

        • memory/2740-1-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB