Analysis
-
max time kernel
6s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2024 14:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe
-
Size
170KB
-
MD5
fba034cb2ee768fb4ff42cb71464980b
-
SHA1
7d7746b8c124621994c4d1a448234c005fa860df
-
SHA256
a032bc2be51f6a445d671a04d5fd081efb4514105f97545b3222d39666aa787e
-
SHA512
d6b8556191e009e1d279e11a90296eafee0609238867b7a2ffdb180a448e0d81e447c0c03498f35a067da03a97a5c07337e1c333a57e116f64b4b1d8d1e1c694
-
SSDEEP
3072:2HeriftL/WSo1vDb53j/8WGUzaqVh4LI8zQpnA:2+rA/WSo1rl3ALrlHQpnA
Malware Config
Signatures
-
Detects command variations typically used by ransomware 2 IoCs
Processes:
resource yara_rule behavioral2/memory/688-0-0x00007FF7814C0000-0x00007FF78184E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral2/memory/688-1-0x00007FF7814C0000-0x00007FF78184E000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing many references to VEEAM. Observed in ransomware 2 IoCs
Processes:
resource yara_rule behavioral2/memory/688-0-0x00007FF7814C0000-0x00007FF78184E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM behavioral2/memory/688-1-0x00007FF7814C0000-0x00007FF78184E000-memory.dmp INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exepid process 3892 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe 3892 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exedescription pid process Token: SeDebugPrivilege 3892 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.execmd.exedescription pid process target process PID 3892 wrote to memory of 3432 3892 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe cmd.exe PID 3892 wrote to memory of 3432 3892 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe cmd.exe PID 3892 wrote to memory of 688 3892 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe sihost.exe PID 3892 wrote to memory of 2196 3892 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe svchost.exe PID 3432 wrote to memory of 2676 3432 cmd.exe reg.exe PID 3432 wrote to memory of 2676 3432 cmd.exe reg.exe PID 3892 wrote to memory of 3140 3892 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe taskhostw.exe PID 3892 wrote to memory of 3568 3892 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe svchost.exe PID 3892 wrote to memory of 3744 3892 2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe DllHost.exe
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3568
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2196
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe" /f3⤵
- Adds Run key to start application
PID:2676
-
-