Analysis
-
max time kernel
162s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe
Resource
win10v2004-20231222-en
General
-
Target
2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe
-
Size
26.6MB
-
MD5
5d52e0e5d2e1c2955011dd585f0848ae
-
SHA1
7da00cb8fac2f21d495111c8754e7cd37f1540f3
-
SHA256
64229251028e91c9b3a44e1a13f7fe2cdc036db7d3ef8b943dedb36d4549d3c0
-
SHA512
e254e58aca8625d0cff2f829a49bdea1952c6010edec5a574bdd9cbfa72ecb525ed9fa66a34e0834000e051cf82ae6aa332d8405acb08e1f0eabcee435937887
-
SSDEEP
98304:9E2RpMMHMMMvMMZMMMlmMMMiMMMYJMMHMMM6MMZMMMqNMMzMMMUMMVMMMYJMMzMr:9nwngnwnC
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HelpMe.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HelpMe.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 HelpMe.exe -
Loads dropped DLL 2 IoCs
pid Process 2740 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe 2740 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: HelpMe.exe File opened (read-only) \??\V: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\L: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\M: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\S: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\K: HelpMe.exe File opened (read-only) \??\E: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\G: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\R: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\U: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\P: HelpMe.exe File opened (read-only) \??\Q: HelpMe.exe File opened (read-only) \??\U: HelpMe.exe File opened (read-only) \??\B: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\T: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\G: HelpMe.exe File opened (read-only) \??\L: HelpMe.exe File opened (read-only) \??\M: HelpMe.exe File opened (read-only) \??\W: HelpMe.exe File opened (read-only) \??\O: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\X: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\A: HelpMe.exe File opened (read-only) \??\H: HelpMe.exe File opened (read-only) \??\I: HelpMe.exe File opened (read-only) \??\N: HelpMe.exe File opened (read-only) \??\A: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\N: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\P: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\Z: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\E: HelpMe.exe File opened (read-only) \??\O: HelpMe.exe File opened (read-only) \??\V: HelpMe.exe File opened (read-only) \??\J: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\K: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\Q: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\Y: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\B: HelpMe.exe File opened (read-only) \??\X: HelpMe.exe File opened (read-only) \??\Z: HelpMe.exe File opened (read-only) \??\H: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\W: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened (read-only) \??\J: HelpMe.exe File opened (read-only) \??\R: HelpMe.exe File opened (read-only) \??\T: HelpMe.exe File opened (read-only) \??\Y: HelpMe.exe File opened (read-only) \??\I: 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened for modification C:\AUTORUN.INF 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File opened for modification F:\AUTORUN.INF HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe File created C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2700 2740 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe 30 PID 2740 wrote to memory of 2700 2740 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe 30 PID 2740 wrote to memory of 2700 2740 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe 30 PID 2740 wrote to memory of 2700 2740 2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2023-12-29_5d52e0e5d2e1c2955011dd585f0848ae_ryuk.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5b7d24d5075bfb2fb52838c5fd90c737b
SHA1a14876045ad43a78a9bc72a5141e09ea17c4eafa
SHA256707b888c118db2c260d5d16159e23919eaf0a4d7a4166b26794b796ccdea717d
SHA512e6d76f99e9a592418dd93a49e8e9af4aefdc9d9ba36d079cf9885ad02df923c29e37e90b952145f95db66b4e5e6b32e45d8e4a66f001c20e357ae7e801f85264
-
Filesize
1KB
MD515f5f0ea9e7135eee8d0a5ff377911c9
SHA154907ed3ee22eb9b68722e1fb61a497b30de9b67
SHA256489cc83de30dc35599d4bc25bcb4d6b590860ca23ab4419a214fc11bcffa29b2
SHA51288a3d002e9a5a6c555b2cd92185db16365c5a93243a2d92a014e2ccd249c606de36283272892288460f2a007976f6eb7092b642e5a438c68512668fd9dadefe2
-
Filesize
950B
MD511ac86bd8e60110e7ee15ab755d492f7
SHA1538d0dfd3b4f760ad9afbc0f9a7564ccf87470b2
SHA2561cd659c3978e9e2d12373205e144520c546099d6f18a85f465155934472c753a
SHA512cb03b79ffee8ded5e196e75355b9b5d5e750fd19f8c766b2b59c2d409f5abfcaaf6bb60e6048bae5642161a46fb996e416c855d82766e7a5355ed4679d3d3ca6
-
Filesize
1.2MB
MD53641c8b7ef5dface1ce914404353ef9e
SHA1186b852d79188fe285a659b97d4ed0f29e8de065
SHA25661fbba0f94116fa9a9df9bb290d2a0c8fb639118625780a8071f190f4b8eb5ac
SHA512150968ca2bb4ce6237fdaa67a9c1ffe80bf44434189c960c3ecaa75f5ec14aad07fd12df402409862b26b17f52d297482e310b1c7c00dd970bcd5903a8346482
-
Filesize
925KB
MD504e7d2ab22d89b01e39a75b2e07b9839
SHA12e517349c79fc6a80014a17554fd3e608e3761b0
SHA25687fbdf4fd03bd61e47133a1b05fc10fc73d1f356cfa90fe6417dd2caefb59ec2
SHA512c7e41a8b0cd6ca5b5fd49215657aa30c4cb8d3702139efd9465acd0b136c09faa5c0af9a8f35a815dac586f8d596437e879857b92f3f7358788667db79695fc7
-
Filesize
64KB
MD5c12c36058eb0c9a2ff4bdb5225cb0066
SHA174691427b3e332ba99751c377c792ab09c50b032
SHA256845967cd05fa3658c710d6b7bcaad6e112ebb88ea3157cc28442d73bfdb2d75c
SHA512c49e60a80a2ebfeb5ebee3713b70f48ddeb5ac6fa3d4741558174e0a79669b2e963e9bfaa42341dba135533d478c8c3dfa3c513bc8ee4c0b316dc58479106a80
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
888KB
MD5c7380abce22a69d66d75160a9234a30d
SHA1acd5695b85b1f85d0e4b3c56b6c2368678e87610
SHA256f78368b9311b40d5698089f0a882c66ed9980c574699ad267189b2d697baa7e2
SHA5121500a8024e854f6fffe6aa167521b2f024e6e89d0f0197c17cc4f048492253753bb1b5ab17d0c16110323dbf51840887e2c0c9c96ea387328c29719eed90dbfc
-
Filesize
2.1MB
MD56ad2d1426241253f4a5749128e188072
SHA131337cca15c458183790c6e2d1c0063ab04e13d0
SHA256a0a1180e96890af3f04b17a0cac0e25e4e9afadf2ebe28d68772da9aba1171fa
SHA512f113abda3ee040d8665e425d754dbc92a785e08f5de32ed710b8afc034e2ee0da32b59f544a2f4ccc5e3961e7daa0a89fceb303d2d37f59863d47e5e245ce260
-
Filesize
641KB
MD52f7afbd96c5cf50240f50364f20365c8
SHA1872f4561ef76f19b9fdc3e4d24d570e409fdd835
SHA256522379b167253633c4ee72d1969bb6f7dfdbaebda43ce4cc7e708e5e541063d0
SHA512c3a559848bbb5f7da178c775a31bf3f04df2247c2ecc38c6c4dfeb0e2c90c57ac0358ad2efddb2e7c33e0fe1ea07a93ed9e884c8cbd4546b6d6681c00f5869fc