Analysis
-
max time kernel
161s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe
-
Size
1.7MB
-
MD5
fda3b583f9ce8e11896b603a1fbd2b6e
-
SHA1
8186d3d9599f9fab538ce25b0e86d4d15ab2f64c
-
SHA256
42c884f1595cdf0b00760519c9a63c404f628f8e773e3173f2a47e4393452b1a
-
SHA512
80fa14a42897f9120fc315743d8c2ece59577f65ea4a38bce7b015b4997213b0f71e23c76ab6211216a3cfbd8a81c38d3bf3172ca80c6359e32e3dd04f64f329
-
SSDEEP
49152:T4f65cTlG8mMHcn3obb0P8/snji6attJM:TSG8mM8wEnW6at
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 1376 alg.exe 1296 DiagnosticsHub.StandardCollector.Service.exe 3216 fxssvc.exe 3004 elevation_service.exe 3220 elevation_service.exe 3828 maintenanceservice.exe 4720 OSE.EXE -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\2079f35fc92b1ccd.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\dotnet\dotnet.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe alg.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1128 2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe Token: SeAuditPrivilege 3216 fxssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_fda3b583f9ce8e11896b603a1fbd2b6e_ryuk.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1376
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1296
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1136
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3004
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3220
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:3828
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4720
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD505233a328f660a8c419bd18b44571d70
SHA1f43d53cae6edb091fc2c2bdd473da95a6e824f38
SHA25665c6caae15f2de283e7b4ddeb7fa727443e40cc12aaf575df08899ad141fa67b
SHA5128d27e69a6b90debda94688e0347c945303ad031cd86ec27e034fe16698a6e781f7b4d2878ddcd9515b7eed963389c88b0650dcc7f1a4e2e3f911198a8746e5d7
-
Filesize
1.3MB
MD5d3bc9f3c599ecc23eda66cae9c449fd1
SHA1cc09954b6cec48eaea25599978244b764a2d30e1
SHA2563ca49266ae1372be899d2e654779b70eb1def02543f1c21e57ff7b6b5288c316
SHA5127102f2ee3ba2b1c24c4c1310e25aff760e4297d75b9cf64b51b6771d82166bb51a87cc21c2d56ee333acb868b57a1fbb02993e122cefa3ea80b17ef80d824c72
-
Filesize
1.3MB
MD54ce41645f05bd9b0b51925264586ec93
SHA1f0d31eab5f229084a5915172c78d67ccbe887449
SHA2562ec5e32edfba7272f710f7c52cb9562bbfad4e970418f1d9bb7076ef58a993ac
SHA512943147276a5794c7c0816ba0bdaf4e300a3a653b3952679dbc6e7ee97b777a5a246b17b953b6a3982bd56b74b2e4da0ea0ea228e39af25cc5161ad8e4e904566
-
Filesize
2.1MB
MD576dd801178d394f2c71ebeccc8904561
SHA156371d6c07ae5082d26133990fcaedea9ba6d39c
SHA256b3517375902f2d6a4405b5fb787666cebe2b31f301e7a2c2b03a58b940e32a86
SHA51216fc33aaada96dfd0a2826250f0ac6375b4a922c4f64886ce559b148332bd66cb3f1da4d3332ae1b0e6464f7ca555d0c04e2843fd687758e5934cf4c52d9c7dd
-
Filesize
1.2MB
MD545865c33dbd7e483a6c9a6a88bff9b1b
SHA15acf4d1449f676dae3c8a6460dc94940937a8c95
SHA256d7ea7d6844d1fbb8e603c9822a8ecd9b3f78ca665ef7b4cc08c1a2f1c2c1804d
SHA512d2f052705e01262f1e67ac44325c82e71ff1f32f08fdf710463dfa05436147ac36b6b65b17a0d7e616f5edf8d68b26fa58565f0aa5aebc054ab01ba0a864200f
-
Filesize
1.2MB
MD5669c38489b96b523ddd674d7e242ea4a
SHA1bab85c0fad5b7194e72b268d2233660a2c2bcced
SHA2569460cc06b04133d43f08248f4cb0c136438428295663d37bfe99674707897e8c
SHA51296c7cfd048e6a6493e152e5910aab8ce6c043d57b7a4268601b96a3ff4a8b34941692718e32ad1a49a56cd072c006ccff9522032aaed14f8f9eba957ca37165b
-
Filesize
1.2MB
MD563cba65b27787b942501886552357add
SHA1f88b016936d4a96100ce68d0ac3cc13dd0076429
SHA256f8783604c4c7f3908a9af443040ea3cc4d7a6a5e19d43b9b4d19e191372af7ba
SHA5128ca6619b78c1fe8a92d4cb96f7a2872c4d4d751cac06ce6f18bbed8b1ae583e3558c618cf188c588945e774ec91004c6f826710af124a6f3d16c2962dce9e0b4
-
Filesize
1.3MB
MD5e583296a4091e41ae85acabc72a4bde0
SHA15bf11737218dac06ba1ba97f00474ca69e6fa8b7
SHA256494483ca594bb0fb3f99db6e6c5d867a885eb9410f8e80469dc27bf9d32d6d6a
SHA5126e9ffaf74f1943d0e1e7d7518e05f13eecbac7ecbff056c6c5eb28ce57286c27221089b94d841f53394a6d7e9255b2e7ec0206149e90d4f4c78a2845e74f9fc3