Analysis
-
max time kernel
7s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe
-
Size
206KB
-
MD5
785441d795ee886e64a262cb4128fa88
-
SHA1
7f44a811f375b0f1345fc899d87830dcb4c7b910
-
SHA256
763f87c330f656f6ad258a660d920a4e633e79e2591a3def855d9444d24cbc8b
-
SHA512
e5b2f6ee99519962c1f5f3bd98fffef2ae6b94d9b18e616746cc787b0e4092254af989680053732aae2c50e291db86146e25cbf56644afe8da8b23f5750691bb
-
SSDEEP
1536:QQNiHikoUR86gSEB47j9kY61YZVDbeLtoepdEgIbsW9d7B9dl23PQx0scIC:Rkot6FEBwrfVDmtoepG19VA3o6scIC
Malware Config
Signatures
-
Detects command variations typically used by ransomware 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2464-1-0x00007FF738EF0000-0x00007FF739287000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exepid process 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exedescription pid process Token: SeDebugPrivilege 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exenet.exenet.exenet.exedescription pid process target process PID 440 wrote to memory of 2464 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe sihost.exe PID 440 wrote to memory of 4092 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe net.exe PID 440 wrote to memory of 4092 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe net.exe PID 4092 wrote to memory of 4008 4092 net.exe net1.exe PID 4092 wrote to memory of 4008 4092 net.exe net1.exe PID 440 wrote to memory of 1924 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe net.exe PID 440 wrote to memory of 1924 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe net.exe PID 440 wrote to memory of 2480 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe svchost.exe PID 1924 wrote to memory of 2940 1924 net.exe net1.exe PID 1924 wrote to memory of 2940 1924 net.exe net1.exe PID 440 wrote to memory of 2848 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe net.exe PID 440 wrote to memory of 2848 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe net.exe PID 2848 wrote to memory of 4484 2848 net.exe net1.exe PID 2848 wrote to memory of 4484 2848 net.exe net1.exe PID 440 wrote to memory of 2720 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe taskhostw.exe PID 440 wrote to memory of 3672 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe svchost.exe PID 440 wrote to memory of 3860 440 2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe DllHost.exe
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3672
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2480
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "spooler" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "spooler" /y3⤵PID:4008
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2940
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4484
-
-